mbrg / genai-attacksLinks
A knowledge source about TTPs used to target GenAI-based systems, copilots and agents
☆131Updated 2 weeks ago
Alternatives and similar repositories for genai-attacks
Users that are interested in genai-attacks are comparing it to the libraries listed below
Sorting:
- Proximity is a MCP security scanner powered with NOVA☆269Updated 3 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆219Updated this week
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆140Updated 2 weeks ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated last week
- ☆223Updated 2 weeks ago
- An open-source knowledge base of defensive countermeasures to protect AI/ML systems. Features interactive views and maps defenses to know…☆114Updated last week
- ☆19Updated 8 months ago
- NOVA: The Prompt Pattern Matching☆62Updated 2 months ago
- Red Teaming for AI and Cloud☆200Updated last month
- ☆186Updated last month
- ☆292Updated this week
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆186Updated last month
- This is a repository to experiment with MCP for security☆45Updated 11 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆152Updated last year
- ☆126Updated 2 weeks ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 6 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 8 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated last month
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆18Updated 9 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆67Updated last month
- An archive of 0day.today exploits☆329Updated 5 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆107Updated 7 months ago
- ☆82Updated 4 months ago
- Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents,…☆961Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆99Updated 2 months ago
- ☆355Updated 3 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated last year
- ☆68Updated 5 months ago
- Payloads for AI Red Teaming and beyond☆315Updated 4 months ago