pasquini-dario / LLMmap
☆20Updated 3 months ago
Alternatives and similar repositories for LLMmap:
Users that are interested in LLMmap are comparing it to the libraries listed below
- ☆28Updated last month
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 9 months ago
- General research for Dreadnode☆19Updated 7 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆79Updated 8 months ago
- AI Powered Sensitive Information Detection☆17Updated 10 months ago
- using ML models for red teaming☆39Updated last year
- ☆45Updated last month
- ☆21Updated 4 years ago
- AutoSpear☆54Updated last year
- SecGPT: An execution isolation architecture for LLM-based systems☆57Updated last month
- Proof of Concept for WatchGuard Authenticated Arbitrary File Read (CVE-2022-31749)☆10Updated 2 years ago
- A collection of prompt injection mitigation techniques.☆20Updated last year
- Vulnerability Environment Build with Dockerfile -> Docker Hub☆15Updated last month
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆9Updated 4 years ago
- Interactive, dynamic, and realistic LLM honeypots☆26Updated last month
- ☆13Updated 4 years ago
- Post-Exploitation script to exfiltrate 7-zip files☆10Updated 2 years ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆13Updated 2 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆46Updated last week
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆11Updated last year
- Path traversal in Ollama with rogue registry server☆20Updated 6 months ago
- ☆41Updated 3 weeks ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆55Updated last year
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆15Updated 11 months ago
- ☆63Updated 3 months ago
- ☆42Updated 8 months ago
- ☆14Updated 11 months ago
- Exploits for various CVEs☆11Updated 2 years ago
- GPT AiCSA(Code security audit),SAST(Static Application Security Testing,静态应用程序安全测试),JAR security analysis, static vulnerability and vulne…☆58Updated last year