Technology, papers, products and other documents related to large language models and large language model security
☆17Mar 29, 2024Updated last year
Alternatives and similar repositories for LLM-Sec
Users that are interested in LLM-Sec are comparing it to the libraries listed below
Sorting:
- SqlServer Linked Password Dumper.☆16Apr 28, 2017Updated 8 years ago
- 基于Golang与Fofa开发的自动化代理节点收集工具☆16Nov 8, 2023Updated 2 years ago
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- ☆17Nov 12, 2019Updated 6 years ago
- 一个基于✨HOOK机制的微信机器人,支持🌱安全新闻定时推送【FreeBuf,先知,安全客,奇安信攻防社区】,👯后缀名查询,⚡备案查询,⚡手机号归属地查询,⚡WHOIS信息查询,⚡星座查询,⚡天气查询,⚡微步威胁情报查询,⚡美女视频,⚡美女图片,👯帮助菜单。📫 支持积…☆20Apr 18, 2025Updated 10 months ago
- 一个基于分布式爬虫的信安文章搜索引擎☆27May 22, 2023Updated 2 years ago
- 一个高价值漏洞采集与推送服务 | A valueable vulnerability collection and push service☆31Sep 24, 2024Updated last year
- Security Observability Framework for ML/AI Model File Loading☆42Aug 20, 2025Updated 6 months ago
- ☆40Nov 25, 2024Updated last year
- generate CobaltStrike's cross-platform payload☆34Jun 16, 2024Updated last year
- Research project for understanding how Mimikatz work and become better at C☆123Oct 22, 2021Updated 4 years ago
- e0e1-abroad 国外项目范围收集☆39May 11, 2024Updated last year
- 一个多源漏洞情报聚合工具,能够从多个权威安全数据源爬取漏洞信息,去重后生成结构化报告。支持自定义时间范围查询、多格式输出和自动化定时任务。☆29Updated this week
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 9 months ago
- 把jsp的cmdshell升级为冰蝎一句话☆11Sep 23, 2019Updated 6 years ago
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- ☆14Updated this week
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- 哥斯拉源码-v3.03-godzilla☆11May 12, 2022Updated 3 years ago
- ☆11Apr 1, 2024Updated last year
- sstap 对接 sspanel 版(机场套壳专用)☆10Nov 2, 2021Updated 4 years ago
- dbeaver 密码破解工具,我的密码必须由我做主。 https://crack-dbeaver-password.r.java666.cn http://crack-dbeaver-password.claw.java666.cn☆50May 28, 2025Updated 9 months ago
- A Test Project for a Network Security-oriented LLM Tool Emulating AutoGPT☆286Nov 15, 2023Updated 2 years ago
- 一款支持微信和QQ、UC手机浏览器的分享工具,可以自定义标题、链接、icon等☆12Apr 19, 2018Updated 7 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- 爆破md5(用户名+密码+salt)的脚本☆12Nov 15, 2021Updated 4 years ago
- Multimodal Affective Analysis Using Hierarchical Attention Strategy☆12Dec 7, 2018Updated 7 years ago
- Pytorch implementation of XGNN☆10Jan 20, 2021Updated 5 years ago
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- Phone Radar is a simple tool that allows you to scan mobile phone numbers and display the provider tied to the number, can be usefull to …☆14Dec 13, 2024Updated last year
- Implementation of paper "Explanability-based backdoor attacks against graph neural networks"☆12Aug 1, 2022Updated 3 years ago