microsoft / PyRIT-ShipLinks
Integrate PyRIT in existing tools
☆37Updated 7 months ago
Alternatives and similar repositories for PyRIT-Ship
Users that are interested in PyRIT-Ship are comparing it to the libraries listed below
Sorting:
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆142Updated 10 months ago
- ☆85Updated last week
- A research project to add some brrrrrr to Burp☆194Updated 8 months ago
- Verizon Burp Extensions: AI Suite☆139Updated 6 months ago
- Payloads for AI Red Teaming and beyond☆293Updated last month
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆299Updated 4 months ago
- The Arcanum Prompt Injection Taxonomy☆289Updated 2 months ago
- ☆20Updated 10 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆83Updated this week
- Azure DevOps Services Attack Toolkit☆298Updated 7 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆266Updated 5 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- A Red Team Activity Hub☆223Updated 3 weeks ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆122Updated last month
- Enumerate Microsoft Entra ID (Azure AD) fast☆97Updated 6 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆322Updated last month
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆154Updated 10 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- ☆173Updated 2 years ago
- This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.☆75Updated last month
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆304Updated last year
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆45Updated last month
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆191Updated last year
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆93Updated last month
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆96Updated 2 months ago
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆314Updated 2 weeks ago
- Cloud subdomains identification tool☆61Updated 6 months ago