phreakAI / metasploit-gymLinks
An environment for testing AI agents against networks using Metasploit.
☆45Updated 2 years ago
Alternatives and similar repositories for metasploit-gym
Users that are interested in metasploit-gym are comparing it to the libraries listed below
Sorting:
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- ☆65Updated 7 months ago
- https://arxiv.org/abs/2412.02776☆59Updated 8 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 3 months ago
- Payloads for Attacking Large Language Models☆96Updated 2 months ago
- ☆25Updated 2 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆36Updated 2 years ago
- ☆52Updated 2 weeks ago
- source code for the offsecml framework☆41Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆51Updated 9 months ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆105Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆131Updated 8 months ago
- using ML models for red teaming☆44Updated 2 years ago
- Code for shelLM tool☆55Updated 7 months ago
- A LLM explicitly designed for getting hacked☆158Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆77Updated 2 weeks ago
- ComPromptMized: Unleashing Zero-click Worms that Target GenAI-Powered Applications☆203Updated last year
- ☆42Updated 8 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆113Updated 2 years ago
- ☆145Updated 3 months ago
- ☆65Updated this week
- LLM | Security | Operations in one github repo with good links and pictures.☆50Updated 8 months ago
- Dropbox LLM Security research code and results☆233Updated last year
- A guide to LLM hacking: fundamentals, prompt injection, offense, and defense☆166Updated 2 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆58Updated 6 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆130Updated last month
- ☆44Updated this week
- A research project to add some brrrrrr to Burp☆185Updated 6 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆67Updated last year