mbrg / genai-attacksLinks
A knowledge source about TTPs used to target GenAI-based systems, copilots and agents
☆116Updated last month
Alternatives and similar repositories for genai-attacks
Users that are interested in genai-attacks are comparing it to the libraries listed below
Sorting:
- NOVA: The Prompt Pattern Matching☆161Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆74Updated this week
- An archive of 0day.today exploits☆155Updated last month
- Curated resources, research, and tools for securing AI systems☆25Updated last week
- ☆298Updated 3 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 5 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆77Updated 3 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆99Updated 2 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 5 months ago
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- Knowledge base on cybercriminal concealment techniques☆76Updated 3 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆85Updated 2 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 2 months ago
- ☆17Updated 4 months ago
- This is a repository to experiment with MCP for security☆42Updated 7 months ago
- Payloads for AI Red Teaming and beyond☆253Updated last month
- ☆63Updated 3 weeks ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆44Updated 2 months ago
- Red Teaming for AI and Cloud☆192Updated 2 months ago
- A tool for mapping cyber crime☆150Updated 4 months ago
- Mapping of open-source detection rules and atomic tests.☆175Updated 7 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆128Updated 8 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆76Updated 2 weeks ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆120Updated last week
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 10 months ago
- Living Off Security Tools☆45Updated 10 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆70Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆247Updated 4 months ago
- Agentic Workflows Made Simple☆152Updated 5 months ago