Prompt injection is a type of security vulnerability that can be exploited to control the behavior of a ChatGPT instance.…
Terminal GPT (tgpt) offers a seamless way to bring the power of ChatGPT 3.5 directly to your command line. This…
In 2025 I wanted to try something new. In addition to a traditional 100 days of Yara, I will also…
Jailbreak is an attack that prompts a language model to give actionable responses to harmful behaviors, such as writing an…
The main philosophy of HASH is to be easy to configure and flexible to mimic any software running on HTTP/HTTPs.…
SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission's (SEC) RSS feed for new 8-K…
Before delving into the topic, let's first clarify the role of an Administrator within the operating system. An Administrator is…
This repository provides a mapping of Atomic Red Team attack simulations to open-source detection rules, such as Sigma and Splunk…
EDR bypass technology is not just for attackers. Many malware now have EDR bypass capabilities, knowledge that pentesters and incident…
Welcome to Better-Sliver, a fork of the Sliver project. This fork is intended to be a community-driven effort to improve…