LLM | Security | Operations in one github repo with good links and pictures.
☆97Apr 21, 2026Updated last week
Alternatives and similar repositories for Awesome-LLMSecOps
Users that are interested in Awesome-LLMSecOps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated 2 years ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆432Aug 1, 2025Updated 8 months ago
- Resk is a robust Python library designed to enhance security and manage context when interacting with LLMs. It provides a protective …☆18Apr 13, 2026Updated 2 weeks ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆101Jan 20, 2025Updated last year
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆102Feb 5, 2026Updated 2 months ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Repository for the work of the CoSAI Technical Steering Committee (TSC)☆21Updated this week
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆15May 15, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- MiniLM (BERT) embeddings from scratch☆20Aug 14, 2025Updated 8 months ago
- CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader "d…☆16Dec 22, 2023Updated 2 years ago
- AI Security Research☆16Jun 21, 2023Updated 2 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- WSO SHELL , wso shell , WSO.php , wso.php , webshell , wso-shell веб-шелл , шелл , WSO2.5 , WSO2.5.1 , WSO2.php , Shell download, C99 , …☆10Jun 25, 2016Updated 9 years ago
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- In-the-wild deepfake detection dataset☆14Mar 5, 2025Updated last year
- exploiting and defending neural networks(神经网络攻防专栏)☆15Mar 2, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Phi-2 Fine Tuning to build a mental health GPT.☆11Jan 6, 2024Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆19Apr 20, 2026Updated last week
- A python script to write a report automatically in docx for a twitter-graph☆14Apr 14, 2022Updated 4 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated 2 months ago
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆53Oct 11, 2025Updated 6 months ago
- ☆53Mar 25, 2025Updated last year
- Phi-2 Colab Notebook☆14Dec 14, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- Code snippet accompanying blog post☆29Oct 14, 2015Updated 10 years ago
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆48Updated this week
- ☆10May 25, 2023Updated 2 years ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 4 months ago
- My ctf-writeups☆12Jan 28, 2019Updated 7 years ago
- ☆44Dec 12, 2024Updated last year