tturba / AI
ChatGPT DAN, Jailbreaks prompt
☆49Updated 2 months ago
Alternatives and similar repositories for AI:
Users that are interested in AI are comparing it to the libraries listed below
- Not The Hidden Wiki - The largest repository of links related to cybersecurity☆674Updated this week
- Zbiór promocji na black friday/black week o tematyce bezpieczeństwa/security/infosec.☆75Updated last month
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆46Updated last month
- A powershell module for hiding payloads in the pixels of images☆56Updated 6 months ago
- Windows Administrator level Implant.☆48Updated 3 months ago
- aws cli pentesting/red team snippets☆32Updated last year
- ☆15Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆95Updated 10 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆48Updated 4 months ago
- Various AD tools needed for penetration testing in one place.☆23Updated last year
- ☆25Updated this week
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆18Updated 2 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated this week
- MalDev & AV-EDR Evasion for Pentesters☆14Updated last year
- Simple C2 using GitHub repository as comms channel.☆30Updated 2 months ago
- ☆15Updated last year
- ☆78Updated 9 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆130Updated 2 months ago
- All the deals for InfoSec related software/tools this Black Friday☆87Updated last year
- ☆75Updated last month
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 6 months ago
- A penetration testing playbook that's suitable for CTF challenges, bug bounty hunting and red team assessments.☆21Updated last week
- Everything and anything related to password spraying☆128Updated 7 months ago
- List of Command&Control (C2) software☆34Updated 2 years ago
- Ping-based Information Lookup and Outbound Transfer☆76Updated 9 months ago
- Protection against HTML smuggling attempts.☆83Updated this week
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆161Updated 3 months ago