☆441Mar 4, 2026Updated last month
Alternatives and similar repositories for genai-security-training
Users that are interested in genai-security-training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Jan 16, 2026Updated 3 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- ☆37Apr 10, 2026Updated 3 weeks ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- ☆58Mar 9, 2026Updated last month
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆261Dec 18, 2025Updated 4 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆129Feb 25, 2026Updated 2 months ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆19Feb 20, 2026Updated 2 months ago
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆42Apr 24, 2026Updated last week
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆440Jun 27, 2025Updated 10 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆51Jan 19, 2026Updated 3 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- 🐛 A list of writeups from the MSRC (Microsoft) Bug Bounty program☆33Oct 29, 2025Updated 6 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆38Feb 28, 2025Updated last year
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆13Oct 8, 2025Updated 6 months ago
- ☆508Apr 14, 2026Updated 2 weeks ago
- Proxy Management for Security Professionals☆25Mar 25, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Qemu Proxmox Template builder project using Packer☆74Dec 5, 2025Updated 4 months ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆34Jan 4, 2026Updated 3 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- A curated list of awesome blockchain security resources☆33Dec 15, 2023Updated 2 years ago
- ☆19Dec 18, 2024Updated last year
- Shellcode packer for CTFs and pentest / red team exams aiming for AV evasion!☆143Apr 4, 2026Updated 3 weeks ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 4 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆113Jul 30, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SharpCoercer is a .NET 4.8 C# tool that leverages 16 different RPC-based coercion methods to force remote Windows hosts to authenticate t…☆58Jul 13, 2025Updated 9 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- An AI-powered agentic red team framework that automates offensive security operations, from reconnaissance to exploitation to post-exploi…☆1,830Updated this week
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆68Apr 25, 2025Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆55Mar 11, 2025Updated last year
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆209Nov 23, 2025Updated 5 months ago