全球AI攻防挑战赛—赛道一:大模型生图安全疫苗注入第二名解题方案
☆27Nov 7, 2024Updated last year
Alternatives and similar repositories for SafeGenInject
Users that are interested in SafeGenInject are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🚀 JailbreakBench 是一个用于评估大语言模型(LLM)安全性的测试工具,专注于检测模型对越狱攻击(Jailbreak)的抵抗能力。通过模拟恶意提示词注入、编码攻击和多轮对话操控,量化模型的漏洞风险,并生成详细报告与可视化分析。支持中英文数据集,适用于安全研究…☆31Sep 1, 2025Updated 7 months ago
- 网络安全 LLM 智能体应用教程☆28Mar 2, 2025Updated last year
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆23Oct 23, 2024Updated last year
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- minimum ELF64 program to calculate its own SHA256.☆18Aug 22, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- TACL 2025: Investigating Adversarial Trigger Transfer in Large Language Models☆19Aug 17, 2025Updated 7 months ago
- ☆31May 30, 2024Updated last year
- ☆11Sep 10, 2024Updated last year
- The official repository for guided jailbreak benchmark☆29Jul 28, 2025Updated 8 months ago
- Official codes for GRA (Accepted by ICCV2023)☆17Jul 18, 2023Updated 2 years ago
- YiJian-Comunity: a full-process automated large model safety evaluation tool designed for academic research☆113Dec 15, 2025Updated 3 months ago
- C/Python library to extract text from MS doc files☆11Aug 15, 2022Updated 3 years ago
- ☆18Mar 24, 2023Updated 3 years ago
- [CVPR2024] MMA-Diffusion: MultiModal Attack on Diffusion Models☆386Jan 8, 2026Updated 3 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆25Sep 7, 2025Updated 7 months ago
- 提示词注入生成器☆51Dec 6, 2025Updated 4 months ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 3 years ago
- ☆34Mar 19, 2021Updated 5 years ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆112Oct 11, 2024Updated last year
- 利用angr去除ollvm的虚假控制流☆14Mar 20, 2021Updated 5 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- ☆29Mar 29, 2023Updated 3 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 白盒CLEFIA加密算法☆14Mar 30, 2016Updated 10 years ago
- The PyTorch implementation of ClickPrompt☆27Oct 14, 2023Updated 2 years ago
- Test LLMs against jailbreaks and unprecedented harms☆39Oct 19, 2024Updated last year
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- 还原脚本及一些测试代码☆10Sep 29, 2021Updated 4 years ago
- Simulator/interpreter for Arm64 machine language☆14Jun 17, 2022Updated 3 years ago
- Vstream - Video Analytics pipeline with Hardware based accelerations (dev - stage)☆10Feb 2, 2024Updated 2 years ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆62Apr 2, 2026Updated last week
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Precision Knowledge Editing (PKE): A novel method to reduce toxicity in LLMs while preserving performance, with robust evaluations and ha…☆11Nov 26, 2024Updated last year
- An implementation of MSSRM method☆11Mar 23, 2023Updated 3 years ago
- The Node.js virtual machine interface in pure standard JS☆14Apr 23, 2017Updated 8 years ago
- Start method tracing using Android's internal APIs☆13Dec 25, 2017Updated 8 years ago
- Useful Plugin for IDA to Trace Function Call Tree☆27Jan 4, 2018Updated 8 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- Exploring advanced prompting tools to query SQL database with multiple tables in natural language using LLMs☆16Aug 23, 2024Updated last year