vmayoral / ExploitFlowLinks
A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.
☆36Updated 2 years ago
Alternatives and similar repositories for ExploitFlow
Users that are interested in ExploitFlow are comparing it to the libraries listed below
Sorting:
- https://arxiv.org/abs/2412.02776☆59Updated 8 months ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- ☆65Updated 7 months ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆29Updated 8 months ago
- using ML models for red teaming☆44Updated 2 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆63Updated 2 months ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 5 months ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆312Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆58Updated 5 months ago
- LLM | Security | Operations in one github repo with good links and pictures.☆49Updated 7 months ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆28Updated 3 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆137Updated this week
- Payloads for Attacking Large Language Models☆96Updated 2 months ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆24Updated last year
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- Interactive, dynamic, and realistic LLM honeypots☆58Updated 6 months ago
- All things specific to LLM Red Teaming Generative AI☆28Updated 10 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆175Updated this week
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- ☆24Updated 2 years ago
- XBOW Validation Benchmarks☆220Updated 2 months ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆90Updated 4 months ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆21Updated last week
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆63Updated 3 months ago
- Secrets scanner that understands code☆149Updated 6 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆128Updated 2 weeks ago
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- Chat automates Nuclei template generation☆109Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆257Updated 6 months ago