protectai / ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
☆1,441Updated last month
Related projects ⓘ
Alternatives and complementary repositories for ai-exploits
- ☆436Updated 7 months ago
- OSCP Cheat Sheet☆2,795Updated last week
- All the deals for InfoSec related software/tools this Black Friday☆3,364Updated this week
- Make it real☆1,453Updated 4 months ago
- The way we interact with our data is changing.☆785Updated 4 months ago
- Differential fuzzing REPL for HTTP implementations.☆715Updated last week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆687Updated 9 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆1,987Updated 3 months ago
- DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an ar…☆2,119Updated 2 months ago
- A curated list of GPT agents for cybersecurity☆5,668Updated 4 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,192Updated this week
- The Python Risk Identification Tool for generative AI (PyRIT) is an open access automation framework to empower security professionals an…☆1,908Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆973Updated last month
- I-SOON/Anxun leak related stuff☆294Updated 8 months ago
- Protection against Model Serialization Attacks☆320Updated this week
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,356Updated this week
- ☆4,661Updated last month
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆841Updated 7 months ago
- Collection of all the GPTs created by the community☆1,247Updated 7 months ago
- Navigate the CVE jungle with ease.☆1,772Updated this week
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆250Updated 3 months ago
- Prompt Injection Primer for Engineers☆363Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,172Updated this week
- A collection of GPT system prompts and various prompt injection/leaking knowledge.☆8,253Updated 3 weeks ago
- A curated list of useful resources that cover Offensive AI.☆1,123Updated 3 weeks ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆329Updated 7 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆2,671Updated 9 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,739Updated 6 months ago
- Helping Ethical Hackers use LLMs in 50 Lines of Code or less..☆452Updated this week