schwartz1375 / genai-essentialsLinks
☆19Updated last week
Alternatives and similar repositories for genai-essentials
Users that are interested in genai-essentials are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 months ago
- AI-powered bug hunter - vscode plugin.☆37Updated last year
- Leverages B64 chunks to split files and save to clipboard☆26Updated last week
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated last year
- ☆15Updated 3 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 weeks ago
- Living Under the Land on Linux ~ BSides Belfast 2025☆37Updated 3 weeks ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆30Updated 9 months ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆21Updated 5 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 7 months ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆22Updated last week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- ☆116Updated 2 years ago
- 2022 CTF public release☆23Updated 3 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- using ML models for red teaming☆45Updated 2 years ago
- Presentaciones de congresos☆55Updated last year
- an Evil Java RMI Registry.☆51Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Updated 10 months ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆68Updated last week
- Red Team Rust (Maldev)☆56Updated 3 weeks ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆72Updated last month