mbrg / genai-attacks
A knowledge source about TTPs used to target GenAI-based systems, copilots and agents
☆35Updated 2 months ago
Alternatives and similar repositories for genai-attacks
Users that are interested in genai-attacks are comparing it to the libraries listed below
Sorting:
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- LLM Testing Findings Templates☆72Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated 2 months ago
- ☆15Updated last month
- A curated list of awesome resources related to enhancing your enterprise Email Security☆44Updated last month
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆45Updated 3 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆23Updated 2 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆33Updated 3 weeks ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆17Updated 9 months ago
- NOVA: The Prompt Pattern Matching☆75Updated 2 weeks ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated this week
- Autonomous AI C2☆30Updated 9 months ago
- ☆14Updated 4 months ago
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated 3 weeks ago
- A fun POC that is built to understand AI security agents.☆31Updated 4 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 6 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- ☆22Updated 2 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆103Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated 10 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 5 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆41Updated 3 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆27Updated 8 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- A not-curated list of cloud hacking labs☆25Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 10 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 6 months ago