A knowledge source about TTPs used to target GenAI-based systems, copilots and agents
☆138Dec 22, 2025Updated 2 months ago
Alternatives and similar repositories for genai-attacks
Users that are interested in genai-attacks are comparing it to the libraries listed below
Sorting:
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- ☆11May 13, 2024Updated last year
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard a…☆32Oct 20, 2024Updated last year
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 4 months ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆19Sep 9, 2025Updated 6 months ago
- tp-link Decrypt/Crypt Config files☆15Oct 25, 2022Updated 3 years ago
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 3 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated 2 weeks ago
- Repository for Ludus french templates☆21Mar 1, 2026Updated last week
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Updated this week
- ☆14Dec 26, 2022Updated 3 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆62Nov 19, 2025Updated 3 months ago
- Cuckoo sandbox ansible role☆16Apr 30, 2023Updated 2 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- ☆55Feb 12, 2026Updated 3 weeks ago
- Shor's algorithm simulation using CUDA☆19Nov 10, 2019Updated 6 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- ☆44Feb 6, 2025Updated last year
- Elastic Security Labs' malware analysis and reverse engineering library☆52Updated this week
- ☆21Jun 3, 2021Updated 4 years ago
- Example agents for the Dreadnode platform☆24Dec 19, 2025Updated 2 months ago
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆24Feb 6, 2026Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆224Sep 4, 2024Updated last year
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- An archive of 0day.today exploits☆347Jul 25, 2025Updated 7 months ago
- Simulator forked from ICSim used during Car Hacking Workshops☆19Aug 30, 2024Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84May 2, 2025Updated 10 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- An Ansible role that runs Vulhub environments on a Linux system.☆20Oct 15, 2025Updated 4 months ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- Hints for the Kusto Detective Agency☆16Dec 17, 2022Updated 3 years ago
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,130Dec 21, 2025Updated 2 months ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago