praetorian-inc / augustusView external linksLinks
LLM security testing framework for detecting prompt injection, jailbreaks, and adversarial attacks — 190+ probes, 28 providers, single Go binary
☆91Updated this week
Alternatives and similar repositories for augustus
Users that are interested in augustus are comparing it to the libraries listed below
Sorting:
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 30+ other AI services in seconds☆56Feb 7, 2026Updated last week
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Quadruped Robot Dogs + ROS & Gelblasters == Dystopian Future "Fox" Hunt☆11Sep 28, 2023Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 2 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆81Jan 26, 2026Updated 2 weeks ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- ☆13Mar 3, 2025Updated 11 months ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 8 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- The only OSINT tool you'll ever need (with database support!)☆81Nov 17, 2025Updated 2 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 3 months ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated 3 weeks ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆260Feb 5, 2026Updated last week
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Jul 10, 2024Updated last year
- ☆164Oct 21, 2025Updated 3 months ago
- A TUI for Active Directory collection.☆67Feb 3, 2026Updated last week
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆48Nov 3, 2025Updated 3 months ago
- ☆88Jul 28, 2022Updated 3 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- One WSL BOF to rule them all☆151Jan 14, 2026Updated last month
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆94Jul 3, 2025Updated 7 months ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆22Aug 13, 2018Updated 7 years ago
- MCP Server to request user feedback via an UI instead of normal Chat☆26May 23, 2025Updated 8 months ago
- The DCERPC only printerbug.py version☆201Oct 30, 2025Updated 3 months ago
- ☆23Feb 2, 2026Updated last week
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆52Dec 9, 2025Updated 2 months ago
- ☆18Jan 27, 2018Updated 8 years ago
- Integer overflow in IOHIDDevice/IOUSBHIDDevice☆20Jun 3, 2016Updated 9 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago