protectai / ai-exploits
A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
☆1,488Updated 2 months ago
Alternatives and similar repositories for ai-exploits:
Users that are interested in ai-exploits are comparing it to the libraries listed below
- ☆440Updated 8 months ago
- All the deals for InfoSec related software/tools this Black Friday☆3,786Updated last month
- OSCP Cheat Sheet☆2,868Updated this week
- Make it real☆1,473Updated 6 months ago
- The way we interact with our data is changing.☆803Updated 5 months ago
- Differential fuzzing REPL for HTTP implementations.☆727Updated 2 weeks ago
- Selfhosted alternative to 12ft.io. and 1ft.io bypass paywalls with a proxy ladder and remove CORS headers from any URL☆4,642Updated 3 months ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,197Updated last month
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,006Updated 5 months ago
- Conference presentation slides☆1,666Updated 3 weeks ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆708Updated 10 months ago
- 5G NR Attacks against Qualcomm and Mediatek smartphones. Fuzzer included⚡☆534Updated 2 months ago
- A curated list of useful resources that cover Offensive AI.☆1,148Updated last week
- A curated list of GPT agents for cybersecurity☆5,794Updated 5 months ago
- Prompt Injection Primer for Engineers☆402Updated last year
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆2,075Updated this week
- the LLM vulnerability scanner☆3,633Updated this week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,232Updated 2 weeks ago
- An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform☆872Updated last month
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆767Updated 2 weeks ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,037Updated last month
- I-SOON/Anxun leak related stuff☆300Updated 10 months ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆556Updated this week
- OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆961Updated 2 months ago
- The open source Tines / Splunk SOAR alternative for security engineers.☆2,475Updated this week
- A repository of code signing certificates known to have been leaked or stolen, then abused by threat actors☆337Updated 9 months ago
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆843Updated 8 months ago
- OSCP Cheatsheet by Sai Sathvik☆984Updated 3 months ago
- A multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,510Updated 3 weeks ago