schwartz1375 / genai-security-trainingView external linksLinks
☆244Dec 22, 2025Updated last month
Alternatives and similar repositories for genai-security-training
Users that are interested in genai-security-training are comparing it to the libraries listed below
Sorting:
- CVE-2025-55182-bypass-waf☆30Jan 8, 2026Updated last month
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Nov 27, 2025Updated 2 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- ☆50Jan 30, 2026Updated 2 weeks ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated last week
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Updated this week
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- ☆16Aug 25, 2025Updated 5 months ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Jan 8, 2026Updated last month
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Mar 11, 2025Updated 11 months ago
- ☆13Sep 8, 2024Updated last year
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆433Jun 27, 2025Updated 7 months ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Python script for privilege escalation for Python☆11Jun 5, 2020Updated 5 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 10 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ☆28Jan 16, 2026Updated last month
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆48Jan 19, 2026Updated 3 weeks ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.