user1342 / Oversight
A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.
☆46Updated 4 months ago
Alternatives and similar repositories for Oversight:
Users that are interested in Oversight are comparing it to the libraries listed below
- Protection against HTML smuggling attempts.☆92Updated last week
- Automated vulnerability discovery and annotation☆65Updated 7 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆51Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 7 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆66Updated last month
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- AI-powered bug hunter - vscode plugin.☆34Updated 6 months ago
- source code for the offsecml framework☆38Updated 9 months ago
- ☆16Updated 11 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆37Updated 4 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 5 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆69Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆36Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆54Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆14Updated 10 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 4 months ago
- ☆64Updated 3 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆116Updated last month
- Minimal workflows☆18Updated last year
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆60Updated last year
- Modular web-application honeypot platform built using go and gin☆56Updated 10 months ago