securitum-com / AILinks
ChatGPT DAN, Jailbreaks prompt
☆18Updated last year
Alternatives and similar repositories for AI
Users that are interested in AI are comparing it to the libraries listed below
Sorting:
- This repository is prepared especially for the participants of the Polish training course "Can you hack everything with Python?". It offe…☆52Updated 6 months ago
- Archiwum wszystkich wydań newslettera unknowNews☆191Updated last week
- Repozytorium zbiorcze z materiałami nt. Wireshark☆76Updated last year
- Materiały do szkolenia Praktyczny Wireshark☆24Updated last year
- OSSEC usefull stuff☆15Updated 2 years ago
- This repository is tailored for participants of the Polish training course "Live Cold Boot Attack: How to Decrypt a Laptop by Freezing Me…☆20Updated 6 months ago
- A modular vulnerability scanner with automatic report generation capabilities.☆937Updated this week
- Not The Hidden Wiki - The largest repository of links related to cybersecurity☆1,658Updated this week
- RSS Feed for Cybermonit.com☆33Updated this week
- one-stop resource for all things offensive security.☆170Updated last month
- Zbiór promocji na black friday/black week o tematyce bezpieczeństwa/security/infosec.☆75Updated 10 months ago
- Darmowy kurs podstawy CyberChef.☆42Updated 4 years ago
- Collection of cheat sheets useful for pentesting☆497Updated last year
- Vulnerable app with examples showing how to not use secrets☆1,359Updated this week
- Open source templates you can use to bootstrap your security programs☆870Updated 4 months ago
- Awesome secure by default libraries to help you eliminate bug classes!☆700Updated 5 months ago
- Pre-Built Vulnerable Environments Based on Docker-Compose☆35Updated 9 months ago
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆684Updated 2 years ago
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆838Updated 6 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,112Updated last week
- ☆28Updated last year
- Threat Intelligence Sharing Platform☆10Updated last month
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆980Updated last year
- SOC Interview Questions☆1,201Updated last year
- Codes sources des challenges de l'édition 2024 du 404 CTF☆33Updated last year
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,779Updated this week
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,271Updated 2 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,259Updated last year
- CRY.ME (CRYptographic MEssaging application)☆169Updated 2 years ago
- secator - the pentester's swiss knife☆1,150Updated 3 weeks ago