vineethsai / vulnerablemcpLinks
☆34Updated 5 months ago
Alternatives and similar repositories for vulnerablemcp
Users that are interested in vulnerablemcp are comparing it to the libraries listed below
Sorting:
- using ML models for red teaming☆45Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 8 months ago
- LLM | Security | Operations in one github repo with good links and pictures.☆86Updated 2 weeks ago
- Data about all known supply-chain attacks through history☆63Updated 8 months ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆17Updated last month
- Automated vulnerability discovery and annotation☆68Updated last year
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆97Updated last month
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 9 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- https://arxiv.org/abs/2412.02776☆67Updated last year
- All things specific to LLM Red Teaming Generative AI☆29Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated last year
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆82Updated 2 weeks ago
- A curated list of argument injection vectors☆41Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Updated 9 months ago
- Example agents for the Dreadnode platform☆22Updated last month
- ☆27Updated 2 weeks ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 months ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 10 months ago
- ☆45Updated last week
- ☆39Updated last year
- Data Scientists Go To Jupyter☆68Updated 10 months ago
- ☆137Updated this week