psiinon / open-source-llm-scanners
☆48Updated last week
Alternatives and similar repositories for open-source-llm-scanners:
Users that are interested in open-source-llm-scanners are comparing it to the libraries listed below
- Additional active scan checks for BURP☆26Updated 5 months ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆73Updated last month
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆18Updated 3 years ago
- Verizon Burp Extensions: AI Suite☆105Updated this week
- A research project to add some brrrrrr to Burp☆147Updated last month
- The Arcanum Prompt Injection Taxonomy☆51Updated 2 weeks ago
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- A web security research tool for DOM testing☆19Updated this week
- ☆60Updated 3 months ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆17Updated 11 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated 3 weeks ago
- ☆25Updated last week
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 8 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆53Updated 2 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆108Updated 2 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆29Updated 2 months ago
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)☆49Updated 2 months ago
- Security Advisories☆32Updated last year
- A recon tool that uses ML to predict subdomains. Then returns those that resolve.☆54Updated 2 weeks ago
- Damn Vulnerable SCA Application☆30Updated 3 months ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 7 months ago
- ☠️ Code for the Defcon Workshop☆23Updated 7 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆29Updated 6 months ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated 11 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated 9 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago