tturba / AILinks
ChatGPT DAN, Jailbreaks prompt
☆98Updated last month
Alternatives and similar repositories for AI
Users that are interested in AI are comparing it to the libraries listed below
Sorting:
- A blind SQL injection brute forcer☆110Updated 2 months ago
- A powershell module for hiding payloads in the pixels of images☆61Updated last year
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆200Updated 2 weeks ago
- ☆23Updated 5 months ago
- All the deals for InfoSec related software/tools this Black Friday☆88Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 11 months ago
- ☆141Updated 3 weeks ago
- Polymorphic Command & Control☆85Updated 4 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆202Updated 3 months ago
- ☆67Updated last month
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆125Updated last year
- List of Command&Control (C2) software☆41Updated 2 years ago
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆63Updated last year
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆100Updated 2 weeks ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆72Updated 3 weeks ago
- Most Responder's configuration power in your hand.☆51Updated 6 months ago
- Simple PoC in PowerShell for CVE-2023-23397☆40Updated 2 years ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆148Updated 5 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆131Updated last year
- ☆95Updated 2 months ago
- :)))))☆46Updated this week
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆39Updated last week
- A summary of the most abbreviations I encountered so far☆25Updated 2 weeks ago
- Neuviks Terraform Red Team Workshop☆13Updated 7 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆145Updated 4 months ago
- Protection against HTML smuggling attacks.☆96Updated last week
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆179Updated 4 months ago
- Tracks a range of Microsoft owned ASNs and publishes a daily release containing a list of IPv4 and IPv6 address in CIDR notation.☆27Updated this week