Skip to main content

Posts

LLM Red Team Payload Vault

URL:   https://crazywifi.github.io/Redteam_LLM_Injection_payloads/ Project Overview The LLM Red Team Payload Vault is a comprehensive, production-ready library of adversarial prompt injection vectors designed for security researchers, pentest teams, and AI developers. This repository consolidates 700+ unique attack payloads merged from industry-standard red teaming tools (such as Promptfoo, Garak, and PyRIT) and exhaustive academic research compendiums. The dataset is organized into 15 specialized categories, providing a structured approach to testing the robustness of Large Language Models (LLMs) and autonomous agents. Key Features Massive Dataset: Includes 700+ deduplicated payloads ranging from simple overrides to complex cryptographic and multi-turn attacks. Structured Taxonomy: Payloads are categorized based on the OWASP Top 10 for LLM Applications, including Direct Injection (LLM01), Sensitive Info Disclosure (LLM02), and System Prompt Leakage (LLM07). Complex Attack Chains: ...

5Min Intraday Stock Historical Data For Download — 2015 to Aug 2025 Download

Are you a trader, analyst, or data enthusiast looking for reliable historical stock market data for India? Look no further! I am offering a  comprehensive dataset  covering  Indian stock data from 2015 to August 2025 . This dataset is perfect for  backtesting trading strategies, algorithmic trading, research, or learning  the Indian stock market trends. What’s included: Stock Database (.db) — stock_database_.db_File_2015_Aug_2025_5min.rar SQL database format Contains 5-minute interval data for all major Indian stocks Easily queryable for automated backtesting or analysis Stock Data in Excel (.xlsx) — Stock_Data_Excel_5min.rar Excel spreadsheets for easy access Ideal for manual analysis or visualization Includes OHLCV data (Open, High, Low, Close, Volume) Why this dataset is valuable: 10+ years of high-resolution historical data — perfect for analyzing long-term trends Ready-to-use formats — database for coders, Excel for analysts Affordable price — get all this ...

Auto_DLL_Hijack_Suite_GUI

  This project provides a suite of two Python-based GUI tools designed to automate and streamline the process of discovering and testing potential DLL hijacking vulnerabilities in Windows applications. Overview This project provides a suite of two Python-based GUI tools designed to automate and streamline the process of discovering and testing potential DLL hijacking vulnerabilities in Windows applications. It leverages Sysinternals Process Monitor (Procmon) for data collection and provides a framework for testing identified hijack points with user-selected payloads. Many applications attempt to load Dynamic Link Libraries (DLLs) without specifying a full path. If these DLLs are not found in standard locations, an attacker might be able to place a malicious DLL with the same name in a location that the application searches earlier (e.g., the application’s own directory if it has weak permissions), leading to the malicious DLL being loaded and executed. Manually identifying all such...

Streamlining DLL Hijacking with Automated Testing

  I’ve developed a script that automates the DLL hijacking process. During my testing, I noticed that we often focus on DLLs marked as “Not Found” when testing for DLL hijacking. However, an interesting observation is that among these “Not Found” DLLs, a few (typically one or two) might actually execute, even though we don’t manually test all of them. This script helps automate the testing of all potential DLLs. Note that the payload execution still requires manual verification, as the script is currently a work in progress. Features: Do not perform testing on DLLs within the Windows directory. If the command prompt runs with administrative privileges, the script will ask if you want to execute with elevated permissions. Allows exploitation with either administrative or normal user privileges. It offers multiple payload options to choose from. Execution Process: Run  Run1_Auto_DLL_Hijacking_Admin.bat  with administrative privileges. It first launches Procmon and then prom...

Binary Protection Checker & Sig Checker Automation Script

  I have developed an automation script for testing binary protection and signature issues. Previously, we had to open the terminal and enter commands, which involved copying paths, and it was a bit irritating for me. Now, with this script, all you need to do is execute the batch file and paste the installable directory path. Both test cases will be performed automatically by this script, and you will receive the results in the same folder under the name "output." It might be helpful for someone. Download:  https://github.com/crazywifi/Binary_Protection_Sig_Checker_Automation.git

How to Create a Telegram Notifications for Conditions in Google Sheet

Create a Bot for the Telegram Alert Open Telegram messenger, sign in to your account or create a new one Enter @Botfather in the search tab and choose this bot. (Official Telegram bots have a blue checkmark beside their name.) Click “Start” to activate BotFather bot.In response, you receive a list of commands to manage bots. Choose or type the /newbot command and send it. Choose a name for your bot — your subscribers will see it in the conversation. And choose a username for your bot — the bot can be found by its username in searches. The username must be unique and end with the word “bot.” Copy the token value. How to Create a New Bot for Telegram: https://sendpulse.com/knowledge-base/chatbot/telegram/create-telegram-chatbot How to Get Your Telegram Chat ID:   https://diyusthad.com/2022/03/how-to-get-your-telegram-chat-id.html In your Telegram account, search for “@myidbot” or open this link t.me/myidbot on your smartphone. Start a conversation with that bot and type /getid. You w...