I Jailbroke Claude Opus/Sonnet 4.6 & Haiku 4.5 with "more+"
-
Updated
May 5, 2026 - HTML
I Jailbroke Claude Opus/Sonnet 4.6 & Haiku 4.5 with "more+"
Authorization Context Analyzer — a framework for describing code, systems, and behaviors by what they do vs. what they assume the right to do. 14-sample reference corpus spanning malware, supply-chain attacks, ICS, social engineering, and LLM prompt injection.
Language Model OSINT Research
Agentic recon CLI: RAG-grounded LLM drives 6 live tools (VisorGraph, aimap, BARE, nuclei, Menlo-hunt, OSV-scan) with every probe sandboxed in gVisor
JAXEN is a stateful, Go-based reconnaissance framework designed to map modern enterprise attack surfaces. Powered by Shodan + local SQLite DB, it specializes in AI/LLM infrastructure hunting, enterprise gateway enumeration (Menlo Security), continuous diffing, and deep TLS certificate forensics.
NuClide findings ledger — ECS-normalized, lifecycle-tracked, append-only SQLite store for AI infrastructure OSINT
Go toolkit + library: structured adversarial corpora for LLM/RAG safety + quality testing. Prompt injection, KB exfiltration, jailbreak, system-prompt probing. CI/CD-ready.
Multi-source AI infrastructure discovery for government TLDs — CT logs + Shodan + DNS + Ollama fingerprinting with Mullvad VPN guard
Agentic LLM injection benchmark — VisorCorpus payload delivery, VisorSD target discovery, HIT/MISS matrix per vector
Seed-polymorphic reconnaissance engine with environmental contamination detection
nmap for AI infrastructure. Finds exposed LLMs, vector databases, and ML model servers. Enumerates what's running, what's unprotected, and what data is inside.
High-performance infrastructure mapping and security recon engine with native gVisor sandboxing and Go Vuln DB integration.
Unified AI/LLM infrastructure hunt & assessment CLI — orchestrates JAXEN, VisorSD, VisorCorpus, BARE, and aimap
Offline Semantic Exploit Mapping. Single-binary BERT encoder for mapping scans to Metasploit without Python or Torch.
Process injection detection benchmark: NtMapViewOfSection + WriteProcessMemory, Sysmon pass/fail per event ID
Shodan exposure scanner + adversarial RAG security testing toolkit
Go OPA-based AI infrastructure assessment engine — ScubaGear-style compliance scoring over NuClide findings
Sentinel-driven template extraction for Claude 4.7 — turn the model from a free-form writer into a precise extraction engine. Methodology + live captures + screencasts.
Reverse engineering of Amazon's client-side bot detection system. Bytecode VM disassembler, neural network extraction (31→16→16→1), RC4 cookie decryptor, AI agent detection analysis. Responsibly disclosed; confirmed by Amazon.
A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.
Add a description, image, and links to the nicholas-kloster topic page so that developers can more easily learn about it.
To associate your repository with the nicholas-kloster topic, visit your repo's landing page and select "manage topics."