LLM security testing framework for detecting prompt injection, jailbreaks, and adversarial attacks — 190+ probes, 28 providers, single Go binary
☆165Mar 26, 2026Updated this week
Alternatives and similar repositories for augustus
Users that are interested in augustus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 60+ other AI services in seconds☆50Updated this week
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- ☆51Nov 26, 2025Updated 4 months ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆90Mar 10, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 参考国外巨佬思路,自己写一个为渗透测试初始化ubuntu虚拟机的bash脚本☆16Oct 13, 2025Updated 5 months ago
- software asset scanning orchestration system☆35Mar 19, 2026Updated last week
- Files for http://deniable.org/windows/windows-callbacks☆26Jul 9, 2020Updated 5 years ago
- AI/LLM local model integration for analysis of reconftw results☆96May 3, 2025Updated 10 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 3 months ago
- Semgrep Pro Rules to ensure code using LLMs is following best practices☆66Updated this week
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Jun 9, 2025Updated 9 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆80Mar 13, 2026Updated 2 weeks ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- Source code for https://makemydrive.fun☆10Nov 13, 2017Updated 8 years ago
- Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra al…☆201Updated this week
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆113Jul 30, 2025Updated 8 months ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated 2 months ago
- OWASP Foundation web repository☆36Mar 16, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Extract most frequent words in a list of subdomains☆13Feb 15, 2025Updated last year
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆29Sep 4, 2025Updated 6 months ago
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆122Dec 29, 2025Updated 3 months ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated 2 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆159Jan 3, 2026Updated 2 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆112Dec 28, 2025Updated 3 months ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆43Feb 20, 2026Updated last month
- ☆200Feb 27, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆12Apr 5, 2025Updated 11 months ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆78Mar 22, 2026Updated last week
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- some bare tooling for interacting with Blazor Server☆14Aug 5, 2022Updated 3 years ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆19May 8, 2025Updated 10 months ago
- Async Python library to parse local and remote disk images.☆82Jul 11, 2025Updated 8 months ago
- A lightweight Python-based tool to extract and enumerate Android components and automatically generate practical ADB commands☆111Jun 14, 2025Updated 9 months ago