vmayoral / ExploitFlowLinks
A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.
☆35Updated last year
Alternatives and similar repositories for ExploitFlow
Users that are interested in ExploitFlow are comparing it to the libraries listed below
Sorting:
- https://arxiv.org/abs/2412.02776☆59Updated 7 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆54Updated 3 months ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆111Updated 2 years ago
- using ML models for red teaming☆43Updated last year
- ☆65Updated 5 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- Payloads for Attacking Large Language Models☆91Updated last month
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆28Updated 3 years ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆25Updated 6 months ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆62Updated 3 weeks ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 4 months ago
- CodeQL Security Queries☆27Updated last week
- Tree of Attacks (TAP) Jailbreaking Implementation☆111Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆121Updated this week
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆58Updated this week
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆111Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆87Updated 11 months ago
- XBOW Validation Benchmarks☆168Updated 3 weeks ago
- Data Scientists Go To Jupyter☆63Updated 4 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Read only mirror - No pull requests☆19Updated 4 years ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆23Updated last year
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆17Updated last year
- 👀CVE Simple List☆70Updated this week
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Updated 2 years ago
- ☆24Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆76Updated 5 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Interactive, dynamic, and realistic LLM honeypots☆52Updated 4 months ago
- A collection of prompt injection mitigation techniques.☆23Updated last year