☆121Dec 3, 2025Updated 3 months ago
Alternatives and similar repositories for Automated-Multi-Turn-Jailbreaks
Users that are interested in Automated-Multi-Turn-Jailbreaks are comparing it to the libraries listed below
Sorting:
- ☆121Feb 3, 2025Updated last year
- ☆19May 14, 2025Updated 9 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆25Nov 4, 2024Updated last year
- Code for Representation Bending Paper☆16Jul 15, 2025Updated 7 months ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- ☆39May 17, 2025Updated 9 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- Security Threats related with MCP (Model Context Protocol), MCP Servers and more☆45Apr 24, 2025Updated 10 months ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆39Jan 17, 2025Updated last year
- The official repository for guided jailbreak benchmark☆29Jul 28, 2025Updated 7 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Residual Quantization Autoencoder, used for interpreting LLMs☆14Jan 1, 2025Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆112Oct 11, 2024Updated last year
- ☆11Nov 12, 2024Updated last year
- Prompt Generator model for Stable Diffusion Models☆11Jun 20, 2023Updated 2 years ago
- An example self-hosted map with all dependencies included☆26Jul 9, 2024Updated last year
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- ☆21Jun 22, 2025Updated 8 months ago
- Welcome to the official repository for Siren, a project aimed at understanding and mitigating harmful behaviors in large language models …☆15Sep 12, 2025Updated 5 months ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- ☆698Jul 2, 2025Updated 8 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- DJI Drone Control Hijacking☆41Sep 13, 2023Updated 2 years ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- ☆17Nov 30, 2022Updated 3 years ago
- ☆35May 9, 2025Updated 9 months ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Python library for Entities, relationships and schemas extraction from documents☆46Dec 6, 2024Updated last year
- ☆128Jul 7, 2025Updated 7 months ago
- Draw DAGs (directed acyclic graphs) as ASCII art, à la Git☆40Jun 3, 2022Updated 3 years ago
- ☆56May 21, 2025Updated 9 months ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago