Skip to content
View Nicholas-Kloster's full-sized avatar
🦩
🦩

Block or report Nicholas-Kloster

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. VisorCorpus VisorCorpus Public

    Go Toolkit that generates prompt injections, jailbreak attempts, KB exfil, cross-tenant leaks, system promp / config probing, infra discovery for LLM/RAG systems

    Go

  2. VisorRAG VisorRAG Public

    Agentic recon CLI: RAG-grounded LLM drives 6 live tools (VisorGraph, aimap, BARE, nuclei, Menlo-hunt, OSV-scan) with every probe sandboxed in gVisor

    Go

  3. VisorGraph VisorGraph Public

    High-performance infrastructure mapping and security recon engine with native gVisor sandboxing and Go Vuln DB integration.

    Go

  4. VisorSD VisorSD Public

    Shodan exposure scanner + adversarial RAG security testing toolkit

    Go

  5. BARE BARE Public

    Offline Semantic Exploit Mapping. Single-binary BERT encoder for mapping scans to Metasploit without Python or Torch.

    Python 1

  6. aimap aimap Public

    nmap for AI infrastructure. Finds exposed LLMs, vector databases, and ML model servers. Enumerates what's running, what's unprotected, and what data is inside.

    Go