mbrg / genai-attacksLinks
A knowledge source about TTPs used to target GenAI-based systems, copilots and agents
☆41Updated 3 weeks ago
Alternatives and similar repositories for genai-attacks
Users that are interested in genai-attacks are comparing it to the libraries listed below
Sorting:
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆61Updated this week
- NOVA: The Prompt Pattern Matching☆128Updated 2 months ago
- LLM Testing Findings Templates☆72Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆28Updated 6 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆36Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 4 months ago
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated last month
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 8 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 4 months ago
- This is a repository to experiment with MCP for security☆40Updated 5 months ago
- ☆17Updated 3 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆122Updated 6 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆62Updated 2 weeks ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆70Updated last year
- Autonomous AI C2☆31Updated 11 months ago
- ☆12Updated 3 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated 2 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated last month
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆35Updated 3 weeks ago
- Protection against HTML smuggling attacks.☆96Updated last month
- ☆133Updated 2 weeks ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆55Updated 5 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 9 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆110Updated this week
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆62Updated 3 weeks ago