A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
☆1,704Oct 23, 2024Updated last year
Alternatives and similar repositories for ai-exploits
Users that are interested in ai-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Protection against Model Serialization Attacks☆677Feb 18, 2026Updated last month
- Secure Jupyter Notebooks and Experimentation Environment☆86Feb 6, 2025Updated last year
- the LLM vulnerability scanner☆7,511Updated this week
- Zero shot vulnerability discovery using LLMs☆2,629Feb 6, 2025Updated last year
- A curated list of GPT agents for cybersecurity☆6,485Jul 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Apr 9, 2026Updated last week
- An offensive data enrichment pipeline☆949Apr 2, 2026Updated 2 weeks ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆172Nov 26, 2023Updated 2 years ago
- All the deals for InfoSec related software/tools this Black Friday☆4,348Nov 28, 2025Updated 4 months ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago
- The Network Execution Tool☆5,407Apr 6, 2026Updated last week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,326Apr 8, 2026Updated last week
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆12,547Feb 23, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,849Nov 3, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated 2 years ago
- The recursive internet scanner for hackers. 🧡☆9,602Updated this week
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,143Dec 21, 2025Updated 3 months ago
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆3,679Updated this week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,812May 22, 2024Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆907Apr 9, 2026Updated last week
- Differential testing framework for HTTP implementations☆928Jan 21, 2026Updated 2 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automating situational awareness for cloud penetration tests.☆2,340Updated this week
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆839Mar 24, 2026Updated 3 weeks ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,412Apr 6, 2026Updated last week
- game of active directory☆7,691Mar 12, 2026Updated last month
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- Canary Detection☆194Oct 20, 2025Updated 5 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,433Apr 9, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,582Feb 5, 2026Updated 2 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,018Jan 7, 2026Updated 3 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,138Oct 21, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,430Mar 1, 2026Updated last month
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago