Skip to content

Expand python exploitation payloads#1300

Merged
jmartin-tech merged 1 commit intoNVIDIA:mainfrom
erickgalinkin:update_exploitation_payloads
Jul 24, 2025
Merged

Expand python exploitation payloads#1300
jmartin-tech merged 1 commit intoNVIDIA:mainfrom
erickgalinkin:update_exploitation_payloads

Conversation

@erickgalinkin
Copy link
Collaborator

Extend python_code_execution.json with some obfuscated reverse shells. Extend web_html_js.json with some payloads that are more likely to evade detection.

Extend `python_code_execution.json` with some obfuscated reverse shells. Extend `web_html_js.json`with some payloads that are more likely to evade detection.
Copy link
Collaborator

@jmartin-tech jmartin-tech left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These looks reasonable to me, are there any specific models or platforms worth testing these against as a sanity check?

@erickgalinkin
Copy link
Collaborator Author

Nothing specific, no. It's just an extension of what we already have. Some more capable models will pass through the obfuscated payloads more accurately and some that reject payloads as potentially harmful will allow these through. Should be a good balance.

@jmartin-tech jmartin-tech changed the title Expand payloads Expand python exploitation payloads Jul 24, 2025
@jmartin-tech jmartin-tech merged commit 2dccd9e into NVIDIA:main Jul 24, 2025
15 checks passed
@github-actions github-actions bot locked and limited conversation to collaborators Jul 24, 2025
@erickgalinkin erickgalinkin deleted the update_exploitation_payloads branch July 24, 2025 22:37
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants