cbyt3's starred repositories
llm-hacking-database
This repository contains various attack against Large Language Models.
awesome-llm-cybersecurity-tools
A curated list of large language model tools for cybersecurity research.
awesome-llm-security
A curation of awesome tools, documents and projects about LLM Security.
PNG-IDAT-Payload-Generator
Generate a PNG with a payload embedded in the IDAT chunk (Based off of previous concepts and code -- credit in README)
prompt-injection-defenses
Every practical and proposed defense against prompt injection.
CitrixSecureAccessSAML
Citrix Secure Access SAML abuse
evilgophish
evilginx3 + gophish
ChromeKatz
Dump cookies and credentials directly from Chrome/Edge process memory
CVE-2020-1472
PoC for Zerologon - all research credits go to Tom Tervoort of Secura
CVE-2020-1472
Test tool for CVE-2020-1472
sam-the-admin
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
violent-python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
blackhat-python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
trufflehog
Find and verify secrets
Red-Team-Infrastructure-Wiki
Wiki to collect Red Team infrastructure hardening resources
awesome-windows-security
List of Awesome Windows Security Resources
Infosec_Reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Field-Manual
A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.
awesome-vulnerable-apps
Awesome Vulnerable Applications
awesome-vulnerable
A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Cheatsheet-God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet