protectai / ai-exploitsLinks
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
☆1,614Updated 8 months ago
Alternatives and similar repositories for ai-exploits
Users that are interested in ai-exploits are comparing it to the libraries listed below
Sorting:
- ☆454Updated last year
- OSCP Cheat Sheet☆3,251Updated 3 weeks ago
- All the deals for InfoSec related software/tools this Black Friday☆3,824Updated 7 months ago
- The way we interact with our data is changing.☆837Updated 11 months ago
- Make it real☆1,507Updated 2 months ago
- A curated list of GPT agents for cybersecurity☆6,107Updated 11 months ago
- A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities …☆2,149Updated last year
- Differential testing framework for HTTP implementations☆834Updated this week
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆730Updated last year
- Navigate the CVE jungle with ease.☆2,029Updated last week
- A curated list of large language model tools for cybersecurity research.☆463Updated last year
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆2,612Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,163Updated last month
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆394Updated last year
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆603Updated last month
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,088Updated 11 months ago
- Prompt Injection Primer for Engineers☆443Updated last year
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆574Updated this week
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,637Updated this week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,341Updated 2 weeks ago
- Uses ChatGPT API, Bard API, and Llama2, Python-Nmap, DNS Recon, PCAP and JWT recon modules and uses the GPT3 model to create vulnerabilit…☆562Updated 7 months ago
- Conference presentation slides☆1,737Updated last month
- Dropbox LLM Security research code and results☆227Updated last year
- I-SOON/Anxun leak related stuff☆321Updated last year
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆877Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- Zero shot vulnerability discovery using LLMs☆1,824Updated 4 months ago
- A curated list of useful resources that cover Offensive AI.☆1,241Updated 2 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,122Updated last month
- Galah: An LLM-powered web honeypot.☆552Updated last month