Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 60+ other AI services in seconds
☆50Mar 28, 2026Updated this week
Alternatives and similar repositories for julius
Users that are interested in julius are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆120Mar 17, 2026Updated last week
- LLM security testing framework for detecting prompt injection, jailbreaks, and adversarial attacks — 190+ probes, 28 providers, single Go…☆165Updated this week
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra al…☆201Updated this week
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- QC: Quantum Computing Simulator for C☆12Apr 8, 2024Updated last year
- Awesome MalDev Links☆52Mar 18, 2026Updated last week
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆136Updated this week
- ☆179Oct 21, 2025Updated 5 months ago
- Security tools for purple team, AI security, and M365/GWS. Authorized use only.☆71Mar 10, 2026Updated 2 weeks ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆80Mar 13, 2026Updated 2 weeks ago
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆134Oct 23, 2025Updated 5 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated 2 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- SSE to Stdio MCP Proxy Server☆20Mar 9, 2026Updated 3 weeks ago
- MCP Server and Kali API Server- With Claude Desktop Integ☆39Apr 2, 2025Updated 11 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 5 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆112Dec 28, 2025Updated 3 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆278Feb 5, 2026Updated last month
- The DCERPC only printerbug.py version☆213Oct 30, 2025Updated 5 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple web viewer for TruffleHog JSON output.☆19Jan 7, 2026Updated 2 months ago
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆48Updated this week
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆18Jul 28, 2025Updated 8 months ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 10 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆54Nov 3, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- TypeScript/JavaScript client libraries for Sliver☆25Mar 15, 2026Updated 2 weeks ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆30Jan 21, 2026Updated 2 months ago
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 6 months ago