A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities
☆1,699Oct 23, 2024Updated last year
Alternatives and similar repositories for ai-exploits
Users that are interested in ai-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Protection against Model Serialization Attacks☆667Feb 18, 2026Updated last month
- Secure Jupyter Notebooks and Experimentation Environment☆87Feb 6, 2025Updated last year
- the LLM vulnerability scanner☆7,312Mar 19, 2026Updated last week
- A curated list of GPT agents for cybersecurity☆6,482Jul 21, 2024Updated last year
- Zero shot vulnerability discovery using LLMs☆2,592Feb 6, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated 3 weeks ago
- An offensive data enrichment pipeline☆944Mar 19, 2026Updated last week
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆169Nov 26, 2023Updated 2 years ago
- All the deals for InfoSec related software/tools this Black Friday☆4,348Nov 28, 2025Updated 3 months ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,273Dec 9, 2025Updated 3 months ago
- The Network Execution Tool☆5,356Mar 20, 2026Updated last week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,315Mar 19, 2026Updated last week
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆12,196Feb 23, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,831Nov 3, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- The recursive internet scanner for hackers. 🧡☆9,538Updated this week
- The Python Risk Identification Tool for generative AI (PyRIT) is an open source framework built to empower security professionals and eng…☆3,593Updated this week
- An offensive/defense security toolset for discovery, recon and ethical assessment of AI Agents☆1,134Dec 21, 2025Updated 3 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,785May 22, 2024Updated last year
- Differential testing framework for HTTP implementations☆929Jan 21, 2026Updated 2 months ago
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,173Mar 28, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆795Mar 20, 2026Updated last week
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆901Mar 11, 2026Updated 2 weeks ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,393Mar 20, 2026Updated last week
- game of active directory☆7,610Mar 12, 2026Updated 2 weeks ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆617Jan 2, 2025Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- Canary Detection☆193Oct 20, 2025Updated 5 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,422Jan 19, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,551Feb 5, 2026Updated last month
- Real fucking shellcode encryptor & obfuscator tool☆1,013Jan 7, 2026Updated 2 months ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,135Oct 21, 2024Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆226Nov 23, 2023Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,422Mar 1, 2026Updated 3 weeks ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,901Oct 29, 2025Updated 4 months ago