santosomar / ai_securityLinks
AI Security Research
☆15Updated 2 years ago
Alternatives and similar repositories for ai_security
Users that are interested in ai_security are comparing it to the libraries listed below
Sorting:
- Simple Chatbot for testing AI Red Team tooling☆15Updated 11 months ago
- ☆10Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ☆12Updated last year
- A list of webshells☆17Updated 2 years ago
- Advanced AWS Access Credentials Scanner ⚡☆13Updated 2 years ago
- using ML models for red teaming☆45Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆17Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆21Updated 3 weeks ago
- A comprehensive list of aerospace affiliated CVEs 🚀👾⚠️☆27Updated last year
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆64Updated 2 months ago
- redteamrecipe.com☆24Updated last year
- ☆76Updated last year
- Quicky serve files over http or https using flask.☆35Updated last year
- Cloud Exploit Framework☆113Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Updated 2 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- Beautify Nessus scan output☆12Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- LLM Vulnerable Application☆13Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated this week
- Computer Network Exploitation (CNE) Field Manual☆14Updated last year
- An accurated list of things to test while pentesting☆11Updated 5 years ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- External recon toolkit☆54Updated last year
- Tool for scanning domains for .git directories.☆17Updated 2 years ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11Updated last year