orcasecurity-research / AIGoatLinks
AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.
☆235Updated last month
Alternatives and similar repositories for AIGoat
Users that are interested in AIGoat are comparing it to the libraries listed below
Sorting:
- Halberd : Multi-Cloud Attack Tool☆278Updated 3 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆249Updated 2 weeks ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆286Updated 9 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated 5 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆226Updated 3 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 6 months ago
- Generate datasets of cloud audit logs for common attacks☆215Updated 9 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆162Updated last year
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆169Updated last month
- ☆182Updated last month
- One Conference 2024☆110Updated 8 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆80Updated 3 weeks ago
- Automated web vulnerability scanning with LLM agents☆316Updated 2 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆163Updated 2 years ago
- A full insecure kubernetes application for testing security tools☆87Updated last month
- A tool to uncover undocumented APIs from the AWS Console.☆102Updated last month
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆199Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆112Updated 8 months ago
- Verizon Burp Extensions: AI Suite☆130Updated last month
- Mapping of open-source detection rules and atomic tests.☆165Updated 4 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆108Updated 6 months ago
- ☆76Updated 2 weeks ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- A research project to add some brrrrrr to Burp☆169Updated 3 months ago
- NOVA: The Prompt Pattern Matching☆111Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆102Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆190Updated 11 months ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆92Updated last year