mbrg / genai-attacksLinks
A knowledge source about TTPs used to target GenAI-based systems, copilots and agents
☆38Updated this week
Alternatives and similar repositories for genai-attacks
Users that are interested in genai-attacks are comparing it to the libraries listed below
Sorting:
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 3 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- LLM Testing Findings Templates☆72Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆27Updated this week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆35Updated 2 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆52Updated 4 months ago
- Autonomous AI C2☆31Updated 11 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆31Updated this week
- NOVA: The Prompt Pattern Matching☆123Updated last month
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆59Updated this week
- ☆16Updated 2 months ago
- ☆37Updated this week
- This is a repository to experiment with MCP for security☆39Updated 5 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 7 months ago
- A curated list of awesome resources related to enhancing your enterprise Email Security☆49Updated 3 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆28Updated 9 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆51Updated 3 weeks ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated last month
- BlueSky OSINT Tool☆14Updated 6 months ago
- An example vulnerable app that integrates an LLM☆21Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆27Updated 5 months ago
- Turn any blog into structured threat intelligence.☆32Updated last week
- Collection of videos of Raids on Cybercriminals☆19Updated 3 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 3 months ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆33Updated 10 months ago
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated last month
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated 11 months ago