vineethsai / vulnerablemcpLinks
☆31Updated 2 months ago
Alternatives and similar repositories for vulnerablemcp
Users that are interested in vulnerablemcp are comparing it to the libraries listed below
Sorting:
- using ML models for red teaming☆44Updated 2 years ago
- https://arxiv.org/abs/2412.02776☆64Updated 10 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated 10 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Updated 4 years ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆90Updated last year
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆64Updated 6 months ago
- A curated list of argument injection vectors☆41Updated 9 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 5 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 7 months ago
- Data about all known supply-chain attacks through history☆60Updated 5 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆140Updated this week
- Collection of Semgrep rules for security analysis☆11Updated last year
- Data Scientists Go To Jupyter☆67Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- software asset scanning orchestration system☆28Updated last week
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Dependency Combobulator☆93Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 5 months ago
- ☆116Updated 2 years ago
- All things specific to LLM Red Teaming Generative AI☆29Updated last year
- Dusseldorf is an out-of-band security tool to help in security research.☆40Updated 2 weeks ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- Automated vulnerability discovery and annotation☆67Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆142Updated 10 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 7 months ago