user1342 / OversightLinks
A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.
☆54Updated last year
Alternatives and similar repositories for Oversight
Users that are interested in Oversight are comparing it to the libraries listed below
Sorting:
- Protection against HTML smuggling attacks.☆101Updated 6 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆83Updated 9 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 8 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 5 months ago
- AI-powered bug hunter - vscode plugin.☆37Updated last year
- BlueSky OSINT Tool☆14Updated last year
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109Updated 8 months ago
- A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.☆205Updated this week
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- https://arxiv.org/abs/2412.02776☆67Updated last year
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆133Updated last month
- Autonomous AI C2☆33Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆117Updated last week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated 2 years ago
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆36Updated this week
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Updated 5 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 8 months ago
- ☆82Updated 5 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆53Updated 10 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated last week
- An OpenAI API Compatible Honeypot Gateway☆17Updated 10 months ago
- PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.☆82Updated last month