phreakAI / metasploit-gymLinks
An environment for testing AI agents against networks using Metasploit.
☆45Updated 2 years ago
Alternatives and similar repositories for metasploit-gym
Users that are interested in metasploit-gym are comparing it to the libraries listed below
Sorting:
- ☆66Updated 4 months ago
- Payloads for Attacking Large Language Models☆118Updated 2 weeks ago
- https://arxiv.org/abs/2412.02776☆67Updated last year
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆113Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆57Updated last year
- Data Scientists Go To Jupyter☆68Updated 10 months ago
- Here Comes the AI Worm: Preventing the Propagation of Adversarial Self-Replicating Prompts Within GenAI Ecosystems☆222Updated 4 months ago
- ☆79Updated last month
- A LLM explicitly designed for getting hacked☆166Updated 2 years ago
- A curated list of large language model tools for cybersecurity research.☆480Updated last year
- ☆155Updated 4 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Updated 2 years ago
- source code for the offsecml framework☆44Updated last year
- ☆44Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆83Updated 8 months ago
- CTF challenges designed and implemented in machine learning applications☆199Updated 3 months ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆336Updated last year
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆99Updated last month
- ☆134Updated last week
- using ML models for red teaming☆45Updated 2 years ago
- Dropbox LLM Security research code and results☆254Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆152Updated last year
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Updated last year
- ☆29Updated 2 years ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆35Updated last year
- LLM | Security | Operations in one github repo with good links and pictures.☆86Updated 2 weeks ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year