schwartz1375 / genai-essentialsLinks
☆27Updated last month
Alternatives and similar repositories for genai-essentials
Users that are interested in genai-essentials are comparing it to the libraries listed below
Sorting:
- ☆21Updated 4 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆187Updated last week
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 5 months ago
- Deployment code for ashirt-server☆20Updated 2 months ago
- AI-powered bug hunter - vscode plugin.☆37Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- ☆15Updated 3 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Updated 11 months ago
- A Burp Suite extension for analyzing Next.js Server Actions - server-side functions identified by hash IDs and `Next-Action` headers.☆40Updated 5 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- Data Scientists Go To Jupyter☆68Updated 10 months ago
- Backend development stack for agents☆29Updated 5 months ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated last year
- A not-curated list of cloud hacking labs☆26Updated last year
- Living Under the Land on Linux ~ BSides Belfast 2025☆37Updated last month
- A simple way to exfiltrate data using spotify API☆19Updated this week
- Java archive implant toolkit.☆61Updated 8 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated last month
- ☆116Updated 2 years ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Posts about different topics☆39Updated 4 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆43Updated 6 months ago