tturba / AILinks
ChatGPT DAN, Jailbreaks prompt
☆99Updated 2 months ago
Alternatives and similar repositories for AI
Users that are interested in AI are comparing it to the libraries listed below
Sorting:
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆63Updated last year
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆200Updated last month
- A powershell module for hiding payloads in the pixels of images☆65Updated last year
- A visual methodology tracking platform tailored for offensive security assessments☆176Updated this week
- A blind SQL injection brute forcer☆109Updated 3 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆186Updated 5 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆147Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆206Updated 4 months ago
- Vagrant provisioning scripts to create a simulated network environment for tabletop exercises☆38Updated 3 years ago
- SQL injection vulnerability scanner☆28Updated 5 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆254Updated 2 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- All the deals for InfoSec related software/tools this Black Friday☆88Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆121Updated 6 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆188Updated 9 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆88Updated this week
- List of Command&Control (C2) software☆42Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 4 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆550Updated 5 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆192Updated 2 weeks ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆102Updated last month
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆226Updated 6 months ago
- ☆23Updated 6 months ago
- ☆23Updated last month
- Obfuscate the bytes of your payload with an association dictionary☆68Updated 2 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆189Updated 5 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆60Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- Here you will find all solutions to all tasks from the https://portswigger.net/ platform written in python☆25Updated 6 months ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago