Showing 18 open source projects for "attack"

View related business solutions
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 1
    CyberStrikeAI

    CyberStrikeAI

    CyberStrikeAI is an AI-native security testing platform built in Go

    CyberStrikeAI is an AI-native security testing platform built in Go that brings autonomous penetration testing, vulnerability discovery, and attack chain analysis into a unified interface. The platform integrates over 100 security tools out of the box and pairs them with an intelligent orchestration engine that can be directed via natural language or policy definitions, allowing users to automate reconnaissance, scanning, exploitation, and reporting without manual sequencing of tools. ...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    promptmap2

    promptmap2

    A security scanner for custom LLM applications

    promptmap is an automated security scanner for custom LLM applications that focuses on prompt injection and related attack classes. The project supports both white-box and black-box testing, which means it can either run tests directly against a known model and system prompt configuration or attack an external HTTP endpoint without internal access. Its scanning workflow uses a dual-LLM architecture in which one model acts as the target being tested and another acts as a controller that evaluates whether an attack succeeded. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    VIPER

    VIPER

    AI-powered red team platform for adversary simulation toolkit

    Viper is a comprehensive red teaming and adversary simulation platform designed to support cybersecurity professionals in conducting advanced security assessments. It integrates a wide range of tools and capabilities required for penetration testing, post-exploitation, and attack simulation workflows into a unified environment. Viper emphasizes ease of use through a graphical interface, allowing users to manage complex operations without relying solely on command-line tools. It includes a large collection of built-in modules that cover multiple stages of the MITRE ATT&CK framework, enabling realistic and structured attack simulations. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    PentestAgent

    PentestAgent

    AI agent framework for black-box security testing

    PentestAgent is an open-source autonomous security testing platform designed to help organizations identify vulnerabilities and assess security posture by simulating real-world attack scenarios without manual intervention. It brings a modular and automated approach to penetration testing by orchestrating a suite of tools and scripts that can emulate common exploitation techniques, reconnaissance workflows, and post-exploitation activities across targets. Users configure rules, policies, and environments, and the agent continuously probes for weaknesses, prioritizes findings, and generates contextual reports that help both technical and non-technical stakeholders understand risk exposure. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 5
    Claw Hunter

    Claw Hunter

    MDM-ready scripts for detecting and monitoring OpenClaw

    ...It focuses on uncovering “shadow AI,” which refers to unauthorized or unmanaged AI agents that operate outside traditional security controls. The tool performs risk assessment by auditing agent permissions, capabilities, and access levels, allowing security teams to evaluate potential attack surfaces. It also helps ensure that these agents do not unintentionally expose sensitive data or create unauthorized access paths across systems.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    rep+

    rep+

    Burp-style HTTP Repeater for Chrome DevTools with built‑in AI

    ...The tool offers hierarchical grouping, tagging, and filtering of captured requests so that developers and security testers can manage complex traffic flows efficiently. It includes AI-assisted insights, where contextual explanations and attack vector suggestions help interpret request outcomes or propose modifications. Additional productivity features like exporting/importing requests, various representation modes (pretty/raw/hex), and bulk replay mechanisms make it suitable for debugging, performance checking, or security probing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    FISSURE

    FISSURE

    The RF and reverse engineering framework for everyone

    ...It is designed as a practical environment for researchers and operators who need to move from raw spectrum observation to structured investigation without stitching together too many separate utilities by hand. The platform supports workflows related to signal discovery, demodulation, packet inspection, fuzzing, and attack simulation, making it useful for both defensive research and controlled lab testing. Its architecture is oriented toward extensibility, so users can integrate additional hardware, signal-processing components, and protocol-specific modules depending on their needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Agentic Security

    Agentic Security

    Agentic LLM Vulnerability Scanner / AI red teaming kit

    The open-source Agentic LLM Vulnerability Scanner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A.I.G

    A.I.G

    Full-stack AI Red Teaming platform

    ...Users can deploy it via Docker or scripts to get a modern web UI that guides them through tasks like scanning third-party frameworks for known CVEs and experimenting with prompt security against attack vectors. The tool provides both a visual interface and a comprehensive API, making integration with internal security systems or CI/CD pipelines practical for ongoing risk management.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 10
    In-The-Wild Jailbreak Prompts on LLMs

    In-The-Wild Jailbreak Prompts on LLMs

    A dataset consists of 15,140 ChatGPT prompts from Reddit

    ...The repository includes a large collection of prompts gathered from real-world platforms such as Reddit, Discord, prompt-sharing communities, and other public sources. Researchers analyze these prompts to identify patterns, attack strategies, and techniques commonly used to trick language models into producing restricted or harmful outputs. The dataset includes thousands of prompts collected across multiple platforms and represents one of the largest collections of jailbreak attempts available for research.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Superagent

    Superagent

    Superagent protects your AI applications

    ...Superagent provides guardrails that block jailbreaks, prompt manipulation, and sensitive data exfiltration. It includes redaction tools to remove PII, PHI, and secrets automatically from text. The platform also scans code repositories to detect AI-specific attack vectors like repo poisoning. Superagent is designed for low-latency production environments and works with any major LLM provider. It enables teams to prove compliance with modern AI security and regulatory standards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Adaptive Intelligence

    Adaptive Intelligence

    Adaptive Intelligence also known as "Artificial General Intelligence"

    Adaptive Intelligence is the implementation of neural science, forensic psychology , behavioral science with machine-learning and artificial intelligence to provide advanced automated software platforms with the ability to adjust and thrive in dynamic environments by combining cognitive flexibility, emotional regulation, resilience, and practical problem-solving skills.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    dorban

    dorban

    A demo for the Svarog AI library.

    ...It contains a player (Pregor) controlled by the user and an NPC (Dorban) controlled by the Svarog interpreter. The objective is to kill the vampire. Or at least to attack him with the optimal chances. The Svarog AI library contains a new optimization algorithm based on so called hidden variables. In order to achieve the objective Dorban will try to convince Pregor to accompany him, and together they will try to find the vampire in a graph with 5 city nodes. When accompanying Dorban use menu item "follow orders" to follow his orders.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14

    InvaderBot

    An invader auto-attack bot for Vikings Clash of Clans.

    An AutoHotKey script that uses image recognition and OCR (with Capture2Text) to auto-attack invaders in the Viking Clash of Clans game, using energy boosts as needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Tower of Zaldagor

    Tower of Zaldagor

    The classic intelligent role playing game

    Tower of Zaldagor is a roleplaying game (RPG) where you need to use your wits and skills to complete challenges. Blade Kahn, a king of Sonthalas, has lost his daughter to the Great White Dragon: Zaldagor. She has been kidnapped by humanoids. You have been picked among the elite to return his daugther safely. Engage into an epic story where Gods change the future and demons interfere with the present. Download and discover the beginning of an epic story. The Android version is now available!...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Swarm Wars

    Swarm Wars

    Safety in numbers.

    REPOSITORY MOVED TO GITHUB: https://github.com/happyjack27/SwarmWars video sample: http://youtu.be/s5mLNbdBQGY A game where you evolve & compete AI swarms. The organisms use swarm intelligence & ant colony optimization. The organisms can communicate through 3-color signaling as well as by laying beacons. They can attack and repair other organisms. They can select mates, and they can gather and distribute food and material. This behavior is controlled by a genetically evolved neural net augmented with online back propagation learning. The back propagation learning uses a reward vector and plasticity matrix that is evolved as part of the genome. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Yet another python powered bot for the browsergame "Travian". We want to make this bot more effective then any human, at construction defensing and farming.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    An isometric game with C++ and SDL. Your beings should survive fighting with other beings, reproducting to make a massive attack and eating. But sometimes you will have to eat some of your own live beings so that others could stay alive, well it's life.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next