shlomihod / awesome-ai-red-teamingView external linksLinks
A curated list of awesome AI Red Teaming resources and tools.
☆29May 12, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-ai-red-teaming
Users that are interested in awesome-ai-red-teaming are comparing it to the libraries listed below
Sorting:
- ☆10Oct 12, 2021Updated 4 years ago
- All things specific to LLM Red Teaming Generative AI☆29Oct 22, 2024Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Interoperable Master Format (IMF) Validation Tool☆12Feb 8, 2016Updated 10 years ago
- ☆10Feb 5, 2026Updated last week
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32May 10, 2018Updated 7 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 2 months ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- Repository containing machine solving attempts and results generated by BoxPwnr☆34Updated this week
- ☆10Oct 9, 2024Updated last year
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- A curated list of awesome LLM Red Teaming training, resources, and tools.☆76Sep 4, 2025Updated 5 months ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- MLX Implementation of Recursive Reasoning with Tiny Networks☆78Oct 11, 2025Updated 4 months ago
- ☆11Oct 13, 2025Updated 4 months ago
- /*The MIT License (MIT) Copyright (c) 2015 Apostolique Permission is hereby granted, free of charge, to any person obtaining a copy of th…☆17Sep 26, 2015Updated 10 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Multimodal LLM agent for HPO☆16Apr 30, 2024Updated last year
- Efficient Message Digest for MXF Files☆10Jul 6, 2020Updated 5 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- 5 Projects based on Unsupervised learning☆11Feb 10, 2021Updated 5 years ago
- SDK for reading the NIS code from an Italian Electronic Identity Card (CIE) using C++☆11Mar 8, 2021Updated 4 years ago
- Parse and validate eIDAS Certificates based on EU Trusted List of Lists☆13Apr 29, 2021Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Sample pipeline demo highlighting how to integrate Falcon Container Sensor into ECS Fargate Workloads☆11Nov 15, 2024Updated last year
- C# .NET Assembly for interacting with File Object DACLs☆46Apr 3, 2020Updated 5 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- AI copilot for n8n.☆20Jun 25, 2025Updated 7 months ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- Fork of AWS-S3 with some custom patches. Removes const_missing hacks like the jaf-s3 gem.☆15Jun 6, 2017Updated 8 years ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 4 months ago
- ☆13Jun 26, 2025Updated 7 months ago