All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.
☆50Apr 8, 2026Updated last month
Alternatives and similar repositories for Awesome-LLM-agent-Security
Users that are interested in Awesome-LLM-agent-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Sep 4, 2024Updated last year
- GALL.AI (prev. Generall.AI) - Telegram Advanced AI Agent System Chat Bot☆15May 2, 2026Updated last week
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆11Apr 14, 2023Updated 3 years ago
- Android监控器(Activity异常destroy , 隐私政策合规)☆11Nov 18, 2021Updated 4 years ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆51Jan 19, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆53Feb 8, 2025Updated last year
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 8 months ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆19Feb 22, 2017Updated 9 years ago
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆21Feb 27, 2026Updated 2 months ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 5 years ago
- ☆13Jun 15, 2024Updated last year
- ent2d2 creates D2 graphs from ent schemas☆31Apr 4, 2024Updated 2 years ago
- Code for the paper "AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models"☆30Sep 27, 2025Updated 7 months ago
- LLM-based meme generator with templates☆14Dec 1, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scan A2A agents for potential threats and security issues☆145Apr 16, 2026Updated 3 weeks ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Aug 7, 2024Updated last year
- A reasonably performant TF-IDF implementation.☆12Nov 20, 2022Updated 3 years ago
- ☆12Jun 7, 2025Updated 11 months ago
- ⚙️ A curated list of static analysis (SAST) tools for all programming languages, config files, build tools, and more. With repository sta…☆26Updated this week
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 8 years ago
- Fuzzing Coreutils with AFL on kubernetes☆13Apr 25, 2019Updated 7 years ago
- [ICLR 2024]: Is Self-Repair a Silver Bullet for Code Generation?☆15May 2, 2024Updated 2 years ago
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆54Oct 11, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆57Oct 4, 2024Updated last year
- ☆22Mar 7, 2022Updated 4 years ago
- Set of research paper reading lists for SDN/OpenFlow related topics☆11Nov 24, 2015Updated 10 years ago
- INDICT: Code Generation with Internal Dialogues of Critiques for Both Security and Helpfulness☆14Nov 10, 2025Updated 5 months ago
- GeoHash implementation for Neo4j graph database☆10Aug 10, 2015Updated 10 years ago
- ☆13Feb 11, 2022Updated 4 years ago
- ☆13Oct 11, 2024Updated last year
- 基于UICrawler开源工程,开发的针对android APP 自动化遍历工具,针对hybird或者纯native APP,做深度优先遍历。主要用于监听被抓取APP的页面是否有变动,并生成diff报告☆14Mar 1, 2019Updated 7 years ago
- Google Client Implementation in Scapy☆14Jun 26, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Example agents for the Dreadnode platform☆33Dec 19, 2025Updated 4 months ago
- Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.☆21Jun 17, 2024Updated last year
- The source code of "Deep attention diffusion graph neural networks for text classification"☆13Nov 11, 2023Updated 2 years ago
- ☆25Jan 17, 2025Updated last year
- pyDYNAM-O: the Dynamic Oscillation Toolbox for Python☆11Jan 30, 2023Updated 3 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago