protectai / ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
☆1,579Updated 6 months ago
Alternatives and similar repositories for ai-exploits:
Users that are interested in ai-exploits are comparing it to the libraries listed below
- ☆448Updated last year
- All the deals for InfoSec related software/tools this Black Friday☆3,808Updated 4 months ago
- Make it real☆1,497Updated 3 weeks ago
- OSCP Cheat Sheet☆3,161Updated this week
- The way we interact with our data is changing.☆827Updated 9 months ago
- Differential testing framework for HTTP implementations☆817Updated last week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆726Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,067Updated 9 months ago
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆2,441Updated this week
- LLM powered fuzzing via OSS-Fuzz.☆1,187Updated this week
- Black Hat Asia 2023 PDF Public☆573Updated last year
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆589Updated 3 months ago
- Navigate the CVE jungle with ease.☆1,979Updated this week
- I leverage OpenAI and ChatGPT to do hackerish things☆880Updated 6 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,312Updated 2 months ago
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆349Updated last year
- A curated list of large language model tools for cybersecurity research.☆449Updated last year
- Dropbox LLM Security research code and results☆222Updated 11 months ago
- Zero shot vulnerability discovery using LLMs☆1,737Updated 2 months ago
- A curated list of GPT agents for cybersecurity☆5,993Updated 9 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,159Updated 2 months ago
- A small collection of vulnerable code snippets☆735Updated 6 months ago
- Prompt Injection Primer for Engineers☆430Updated last year
- An offensive data enrichment pipeline☆674Updated last week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆643Updated last month
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆550Updated 5 months ago
- DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an ar…Updated 3 months ago
- ☆265Updated last year
- ☆292Updated 8 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,577Updated last month