protectai / ai-exploitsLinks
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
☆1,644Updated 9 months ago
Alternatives and similar repositories for ai-exploits
Users that are interested in ai-exploits are comparing it to the libraries listed below
Sorting:
- All the deals for InfoSec related software/tools this Black Friday☆3,828Updated 8 months ago
- ☆456Updated last year
- OSCP Cheat Sheet☆3,357Updated 2 weeks ago
- Make it real☆1,517Updated 3 weeks ago
- A curated list of useful resources that cover Offensive AI.☆1,262Updated this week
- Differential testing framework for HTTP implementations☆850Updated this week
- The way we interact with our data is changing.☆846Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,073Updated last week
- A curated list of GPT agents for cybersecurity☆6,173Updated last year
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,166Updated last year
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆733Updated last year
- Prompt Injection Primer for Engineers☆449Updated last year
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆618Updated this week
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆2,742Updated last week
- An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform☆974Updated this week
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,700Updated last week
- Helping Ethical Hackers use LLMs in 50 Lines of Code or less..☆735Updated last month
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,130Updated 2 weeks ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,362Updated last month
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,658Updated this week
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆918Updated last year
- AI-Powered Penetration Testing Assistant☆1,129Updated this week
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆564Updated 9 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,384Updated last year
- Collection of cheat sheets useful for pentesting☆472Updated last year
- Conference presentation slides☆1,757Updated 2 months ago
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆581Updated last month
- I-SOON/Anxun leak related stuff☆327Updated last year
- a security scanner for custom LLM applications☆890Updated last week
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆293Updated 11 months ago