A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
☆1,693Oct 23, 2024Updated last year
Alternatives and similar repositories for ai-exploits
Users that are interested in ai-exploits are comparing it to the libraries listed below
Sorting:
- the LLM vulnerability scanner☆7,088Feb 25, 2026Updated last week
- Protection against Model Serialization Attacks☆647Feb 18, 2026Updated 2 weeks ago
- A curated list of GPT agents for cybersecurity☆6,465Jul 21, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆816Feb 17, 2025Updated last year
- An offensive data enrichment pipeline☆924Updated this week
- Zero shot vulnerability discovery using LLMs☆2,511Feb 6, 2025Updated last year
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Feb 25, 2026Updated last week
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆11,866Feb 23, 2026Updated last week
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆168Nov 26, 2023Updated 2 years ago
- The Network Execution Tool☆5,296Feb 27, 2026Updated last week
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,130Dec 21, 2025Updated 2 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,263Dec 9, 2025Updated 2 months ago
- The recursive internet scanner for hackers. 🧡☆9,468Updated this week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,773May 22, 2024Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,823Nov 3, 2024Updated last year
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆3,500Updated this week
- Differential testing framework for HTTP implementations☆926Jan 21, 2026Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Updated this week
- Automating situational awareness for cloud penetration tests.☆2,299Updated this week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆723Feb 28, 2026Updated last week
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,530Feb 5, 2026Updated last month
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,410Jan 19, 2026Updated last month
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,372Feb 25, 2026Updated last week
- Secure Jupyter Notebooks and Experimentation Environment☆86Feb 6, 2025Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Feb 28, 2026Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,900Oct 29, 2025Updated 4 months ago
- game of active directory☆7,505Updated this week
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,029Jul 12, 2025Updated 7 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,011Jan 7, 2026Updated 2 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,131Oct 21, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- All the deals for InfoSec related software/tools this Black Friday☆4,343Nov 28, 2025Updated 3 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,280Updated this week