Highlights
Starred repositories
A tool to transform Chromium browsers into a C2 Implant
Test your prompts, agents, and RAGs. AI Red teaming, pentesting, and vulnerability scanning for LLMs. Compare performance of GPT, Claude, Gemini, Llama, and more. Simple declarative configs with co…
A powerful tool for automated LLM fuzzing. It is designed to help developers and security researchers identify and mitigate potential jailbreaks in their LLM APIs.
BSides Prishtina 2024 Malware Development and Persistence workshop
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from …
Experimental tools to backdoor large language models by re-writing their system prompts at a raw parameter level. This allows you to potentially execute offline remote code execution without runnin…
A curated list of awesome reversing resources
Collection of codes focused on Linux rootkits
Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.
Pure Malware Development Resource Collections
A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4" 720X720 TFT display
Perfect DLL Proxying using forwards with absolute paths.
Mycroft interface for Raspberry Pi environment
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in gener…
Basics on commands/tools/info on how to assess the security of mobile applications
All Algorithms implemented in Python
A curated list of deep learning resources for computer vision
A curated list of awesome Machine Learning frameworks, libraries and software.