☆29Oct 15, 2025Updated 4 months ago
Alternatives and similar repositories for Awesome-Agent-Security
Users that are interested in Awesome-Agent-Security are comparing it to the libraries listed below
Sorting:
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- ☆36Dec 9, 2025Updated 3 months ago
- Flow Integrity Deterministic Enforcement System. Mechanisms for securing AI agents with information-flow control.☆78May 30, 2025Updated 9 months ago
- ☆10Oct 9, 2024Updated last year
- ☆11Nov 7, 2025Updated 4 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Resources for security engineer job search.☆11Jan 25, 2026Updated last month
- ☆14Mar 10, 2025Updated 11 months ago
- Code and data of the CCS '22 paper titled "Understanding Security Issues in the NFT Ecosystem"☆11Dec 20, 2022Updated 3 years ago
- ☆14Mar 9, 2025Updated last year
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Learning playground for Argus-SAF☆10Dec 27, 2018Updated 7 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- [WIP] pivot a running process into an emulator for instrumentation☆13Aug 12, 2016Updated 9 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- A powerful command-line interface for Perplexity AI with ultra-fast RAG capabilities. Built with ❤️ for developers who need lightning-fas…☆23Dec 28, 2025Updated 2 months ago
- ☆10Oct 12, 2021Updated 4 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆12Jan 15, 2022Updated 4 years ago
- Flatten/Nest Javascript objects☆21Dec 21, 2023Updated 2 years ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆39Mar 2, 2026Updated last week
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆12Jul 10, 2021Updated 4 years ago
- ☆11Jul 8, 2024Updated last year
- Open-source drop-in replacement for IOUlive (written in Perl)☆17May 23, 2016Updated 9 years ago
- 一款支持微信和QQ、UC手机浏览器的分享工具,可以自定义标题、链接、icon等☆12Apr 19, 2018Updated 7 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 3 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Oct 20, 2015Updated 10 years ago
- PoC collection☆13Oct 1, 2020Updated 5 years ago