joey-melo / payloadsLinks
Payloads for AI Red Teaming and beyond
☆221Updated last week
Alternatives and similar repositories for payloads
Users that are interested in payloads are comparing it to the libraries listed below
Sorting:
- The Arcanum Prompt Injection Taxonomy☆131Updated 2 months ago
- A research project to add some brrrrrr to Burp☆181Updated 5 months ago
- ☆187Updated 3 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆244Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆258Updated 2 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆245Updated 2 months ago
- AI for Ethical Hacking - Workshop☆142Updated last month
- ☆305Updated last month
- Verizon Burp Extensions: AI Suite☆132Updated 3 months ago
- A LLM explicitly designed for getting hacked☆155Updated 2 years ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆109Updated 2 months ago
- Dredging up secrets from the depths of the file system☆129Updated 9 months ago
- OWASP Foundation web repository☆323Updated this week
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆226Updated 8 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆201Updated last month
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆74Updated last month
- Find CVEs associated to Linux and public exploits on github☆119Updated 3 months ago
- Cloud subdomains identification tool☆60Updated 3 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- FrogPost: postMessage Security Testing Tool☆92Updated 2 months ago
- ☆241Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 3 months ago
- ☆288Updated last week
- Halberd : Multi-Cloud Agentic Attack Tool☆299Updated 3 weeks ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆40Updated 6 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆189Updated 11 months ago
- OWASP Foundation web repository☆38Updated 5 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆293Updated 11 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆95Updated last year
- A collection of Turbo Intruder scripts.☆63Updated 6 months ago