LLM security testing framework for detecting prompt injection, jailbreaks, and adversarial attacks — 190+ probes, 28 providers, single Go binary
☆178Apr 10, 2026Updated last week
Alternatives and similar repositories for augustus
Users that are interested in augustus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 60+ other AI services in seconds☆58Apr 11, 2026Updated last week
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆88Apr 4, 2026Updated 2 weeks ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆65Mar 27, 2026Updated 3 weeks ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Subdomain Scanner - the most exhaustive tool for sub-domain recognition and mapping to related IPs and ASNs☆18Jul 4, 2025Updated 9 months ago
- Files for http://deniable.org/windows/windows-callbacks☆26Jul 9, 2020Updated 5 years ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆99Mar 10, 2026Updated last month
- ☆13Mar 24, 2026Updated 3 weeks ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- Semgrep Pro Rules to ensure code using LLMs is following best practices☆68Mar 25, 2026Updated 3 weeks ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆30Jun 9, 2025Updated 10 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆113Jul 30, 2025Updated 8 months ago
- ☆69Apr 8, 2026Updated last week
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 2 months ago
- An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploi…☆1,738Apr 10, 2026Updated last week
- OWASP Foundation web repository☆36Apr 3, 2026Updated 2 weeks ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆279Feb 5, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The DCERPC only printerbug.py version☆214Oct 30, 2025Updated 5 months ago
- Extract most frequent words in a list of subdomains☆13Feb 15, 2025Updated last year
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Scan websites for exposed Supabase JWTs, enumerate accessible tables, and detect sensitive data exposure automatically.☆124Dec 29, 2025Updated 3 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 3 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 3 months ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆43Apr 5, 2026Updated 2 weeks ago
- Security Scanner for Agent Skills☆1,762Apr 10, 2026Updated last week
- ☆202Feb 27, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆12Apr 5, 2025Updated last year
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆21May 8, 2025Updated 11 months ago
- Async Python library to parse local and remote disk images.☆82Jul 11, 2025Updated 9 months ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 6 months ago