Rami McCarthy's starred repositories

YubiKey-Guide

Guide to using YubiKey for GnuPG and SSH

Language:HTMLLicense:MITStargazers:11071Issues:220Issues:235

readability

A standalone version of the readability lib

Language:JavaScriptLicense:NOASSERTIONStargazers:8635Issues:102Issues:557

adversarial-robustness-toolbox

Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams

Language:PythonLicense:MITStargazers:4750Issues:101Issues:882

llm-security

New ways of breaking app-integrated LLMs

Language:Jupyter NotebookLicense:MITStargazers:1793Issues:35Issues:4

CloudComparer

Compare the various managed cloud services offered by the major public cloud providers in the market.

Language:SCSSLicense:MITStargazers:1434Issues:94Issues:97

garak

LLM vulnerability scanner

Language:PythonLicense:Apache-2.0Stargazers:1248Issues:17Issues:534

llm-guard

The Security Toolkit for LLM Interactions

Language:PythonLicense:MITStargazers:1112Issues:18Issues:58

rebuff

LLM Prompt Injection Detector

Language:TypeScriptLicense:Apache-2.0Stargazers:1063Issues:14Issues:56

awesome-secure-defaults

Awesome secure by default libraries to help you eliminate bug classes!

pike

Pike is a tool for determining the permissions or policy required for IAC code

Language:GoLicense:Apache-2.0Stargazers:554Issues:6Issues:47

incidental

An opensource incident management platform integrating with Slack.

Language:PythonLicense:MITStargazers:504Issues:5Issues:2

prompt-injection-defenses

Every practical and proposed defense against prompt injection.

aegis

Self-hardening firewall for large language models

Language:PythonLicense:MITStargazers:254Issues:3Issues:0

apeman

AWS Attack Path Management Tool - Walking on the Moon

Language:GoLicense:BSD-3-ClauseStargazers:182Issues:7Issues:20

Gato-X

GitHub Attack Toolkit - Extreme Edition

Language:PythonLicense:Apache-2.0Stargazers:145Issues:5Issues:2

llm-security-101

Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.

CloudCommotion

Cloud Commotion intends to cause chaos to simulate security incidents

Language:HCLLicense:Apache-2.0Stargazers:122Issues:2Issues:0

prompt-hacker-collections

prompt attack-defense, prompt Injection, reverse engineering notes and examples | 提示词对抗、破解例子与笔记

License:MITStargazers:109Issues:3Issues:0

tidcli

A simple touchID prompt'er for use in shell scripts.

Language:SwiftLicense:GPL-3.0Stargazers:89Issues:1Issues:0

arsenal

CALDERA plugin for adversary emulation of AI-enabled systems

Language:PythonLicense:Apache-2.0Stargazers:82Issues:2Issues:2

aws-mine

AWS honey token manager

Language:TypeScriptLicense:MIT-0Stargazers:74Issues:0Issues:0

llm-testing-findings

LLM Testing Findings Templates

Language:HTMLLicense:MITStargazers:65Issues:9Issues:0

waf-btk

WAF bypass PoC

Language:GoLicense:MITStargazers:43Issues:2Issues:2

proxy

Security and compliance proxy for LLM APIs

Language:JavaScriptLicense:AGPL-3.0Stargazers:43Issues:1Issues:0
Language:JavaScriptLicense:Apache-2.0Stargazers:30Issues:1Issues:13
Language:PythonLicense:Apache-2.0Stargazers:21Issues:0Issues:0

caizen

Harness the security superpowers of your cloud asset inventory

Language:PythonLicense:Apache-2.0Stargazers:7Issues:0Issues:0

ddexport

A cli utility to export datadog logs and spans (more than the 5000 allowed in the UI)

Language:GoStargazers:6Issues:3Issues:0

metatrapd

A canary service for cloud metadata end-points

Language:GoLicense:Apache-2.0Stargazers:6Issues:2Issues:0