schwartz1375 / genai-essentialsView external linksLinks
☆28Jan 16, 2026Updated 3 weeks ago
Alternatives and similar repositories for genai-essentials
Users that are interested in genai-essentials are comparing it to the libraries listed below
Sorting:
- ☆30Feb 5, 2026Updated last week
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Nov 24, 2025Updated 2 months ago
- OAuth 2.0 Dynamic Security Scanner☆33Feb 27, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Secure access cloud terraform provider☆13Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- A tool to convert smali codes to java-like codes☆23May 6, 2015Updated 10 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 9 months ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated last week
- Challenges for the GRCon 2022 CTF☆10Oct 5, 2022Updated 3 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 6 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- ☆12Mar 14, 2022Updated 3 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 10 months ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 8 years ago
- ☆10Jun 30, 2016Updated 9 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 10 months ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 5 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- buddycloud static site generation and gh_pages☆18Sep 8, 2016Updated 9 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- using ML models for red teaming☆45Aug 9, 2023Updated 2 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 9 months ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year