microsoft / PyRIT-ShipLinks
Integrate PyRIT in existing tools
☆42Updated 9 months ago
Alternatives and similar repositories for PyRIT-Ship
Users that are interested in PyRIT-Ship are comparing it to the libraries listed below
Sorting:
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆150Updated 11 months ago
- ☆110Updated this week
- Payloads for AI Red Teaming and beyond☆304Updated 3 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 7 months ago
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- The Arcanum Prompt Injection Taxonomy☆325Updated 3 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆310Updated 6 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated last week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆273Updated 6 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆172Updated this week
- ☆21Updated 11 months ago
- source code for the offsecml framework☆43Updated last year
- Azure DevOps Services Attack Toolkit☆305Updated 8 months ago
- ☆343Updated 5 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆102Updated 3 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆68Updated 7 months ago
- A LLM explicitly designed for getting hacked☆163Updated 2 years ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆99Updated 7 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- ☆94Updated 4 months ago
- ☆174Updated 7 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆309Updated last year
- ☆174Updated 2 years ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 2 months ago
- A Red Team Activity Hub☆225Updated 3 weeks ago
- Cloud subdomains identification tool☆61Updated 7 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- LLM Testing Findings Templates☆75Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆196Updated last year
- Retired TrustedSec Capabilities☆248Updated last year