microsoft / PyRIT-ShipLinks
Integrate PyRIT in existing tools
☆43Updated 9 months ago
Alternatives and similar repositories for PyRIT-Ship
Users that are interested in PyRIT-Ship are comparing it to the libraries listed below
Sorting:
- ☆123Updated this week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆152Updated last year
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆317Updated 6 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- Payloads for AI Red Teaming and beyond☆311Updated 3 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated last week
- ☆21Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆187Updated this week
- source code for the offsecml framework☆46Updated last year
- The Arcanum Prompt Injection Taxonomy☆375Updated last week
- Azure DevOps Services Attack Toolkit☆305Updated 9 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆345Updated 3 months ago
- A LLM explicitly designed for getting hacked☆165Updated 2 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆274Updated 7 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆116Updated last year
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆310Updated last year
- Reference notes for Attacking and Defending Generative AI presentation☆68Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 3 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆102Updated 4 months ago
- User Enumeration of Microsoft Teams users via API☆180Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- Azure AD cheatsheet for the CARTP course☆141Updated 3 years ago
- Retired TrustedSec Capabilities☆248Updated last year
- ☆348Updated 6 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 7 months ago
- LLM Testing Findings Templates☆75Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆226Updated 8 months ago
- Cloud subdomains identification tool☆62Updated 8 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆162Updated last year