orcasecurity-research / AIGoatLinks
AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.
☆259Updated 4 months ago
Alternatives and similar repositories for AIGoat
Users that are interested in AIGoat are comparing it to the libraries listed below
Sorting:
- Payloads for AI Red Teaming and beyond☆314Updated 5 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆218Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆283Updated 8 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Updated last year
- A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.☆392Updated this week
- A research project to add some brrrrrr to Burp☆197Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆334Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- ☆314Updated 7 months ago
- ☆192Updated 9 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- ☆367Updated 4 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆81Updated 2 months ago
- A web CTF for training developers in bug hunting and secure coding!☆100Updated last year
- ☆244Updated last month
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆102Updated 4 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆167Updated 2 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆52Updated 6 months ago
- OWASP Foundation web repository☆43Updated last month
- ☆360Updated 7 months ago
- ☆139Updated 2 weeks ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last month
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆314Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆433Updated this week
- Dredging up secrets from the depths of the file system☆132Updated last year
- ☆61Updated 8 months ago
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆102Updated 2 weeks ago