user1342 / OversightLinks
A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.
☆50Updated 10 months ago
Alternatives and similar repositories for Oversight
Users that are interested in Oversight are comparing it to the libraries listed below
Sorting:
- Protection against HTML smuggling attacks.☆97Updated 2 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 4 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆128Updated 4 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 2 weeks ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆40Updated 4 months ago
- Hijack a slack bot to phish your way in☆56Updated last month
- https://arxiv.org/abs/2412.02776☆62Updated 9 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆90Updated last week
- An archive of 0day.today exploits☆163Updated last month
- If these strings are in your code, you might have a problem!☆51Updated 2 weeks ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆101Updated 3 months ago
- Burp Suite extension for testing Passkey systems.☆74Updated 5 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆133Updated last week
- ☆33Updated 5 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆81Updated 3 weeks ago
- AI-powered bug hunter - vscode plugin.☆36Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 6 months ago
- A very simple open source implementation of Google's Project Naptime☆169Updated 5 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- An OpenAI API Compatible Honeypot Gateway☆16Updated 5 months ago
- ☆31Updated 2 weeks ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆73Updated this week
- The most complete code auditing platform with thousands of real-world challenges☆127Updated 2 months ago