☆330Dec 22, 2025Updated 2 months ago
Alternatives and similar repositories for genai-security-training
Users that are interested in genai-security-training are comparing it to the libraries listed below
Sorting:
- ☆33Jan 16, 2026Updated last month
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- ☆37Updated this week
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 3 weeks ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆233Dec 18, 2025Updated 2 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆93Mar 1, 2026Updated last week
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆115Feb 28, 2026Updated last week
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆438Jun 27, 2025Updated 8 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- ☆50Jan 30, 2026Updated last month
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 5 months ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated 2 weeks ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 25, 2026Updated last week
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Mar 3, 2026Updated last week
- ☆16Aug 25, 2025Updated 6 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 3 months ago
- A Cybersecurity Generalist LLM (ICLR'26)☆33Feb 9, 2026Updated last month
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- ☆13Sep 8, 2024Updated last year
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆14Dec 27, 2020Updated 5 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Mar 11, 2025Updated 11 months ago
- ☆19Dec 18, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated last year
- Python script for privilege escalation for Python☆11Jun 5, 2020Updated 5 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- ☆36Oct 16, 2023Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆204Mar 6, 2025Updated last year
- List of helpful tools for every CTF Category☆19May 2, 2017Updated 8 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- URILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.☆54Feb 15, 2026Updated 3 weeks ago