Detection of malicious prompts used to exploit large language models (LLMs) by leveraging supervised machine learning classifiers.
☆20Oct 30, 2024Updated last year
Alternatives and similar repositories for malicious-prompt-detection
Users that are interested in malicious-prompt-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jan 17, 2025Updated last year
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated 2 months ago
- VANET using OMNET++, SUMO, Open Street Map, Veins, Inet☆11May 14, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆12Jul 16, 2024Updated last year
- AI-Powered Threat Intelligence MCP tool☆33Jul 18, 2025Updated 8 months ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆467Jan 31, 2024Updated 2 years ago
- A Terraform reproducer for IngressNightmare☆26Mar 26, 2025Updated last year
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year
- Fast file copy over WinRM protocol for Go clients☆10Jan 15, 2026Updated 2 months ago
- Tool developed using csharp (.net 4.5) for compressing and encrypting files to shorten transfer times. Supports multi-file compression an…☆14Feb 15, 2024Updated 2 years ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆28Oct 19, 2023Updated 2 years ago
- Making transparency normal!☆24Dec 18, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- ☆14Sep 11, 2023Updated 2 years ago
- Working Memory Attack on LLMs☆17May 27, 2025Updated 10 months ago
- HTB CDSA Notes I made to reference for the exam.☆33Nov 9, 2024Updated last year
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆55Sep 19, 2025Updated 6 months ago
- [ACL 2025] The official implementation of the paper "PIGuard: Prompt Injection Guardrail via Mitigating Overdefense for Free".☆63Dec 4, 2025Updated 3 months ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- BLEU Score in Rust☆12Mar 1, 2026Updated 3 weeks ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Various eBPF programs for tracing network connections☆32Oct 26, 2021Updated 4 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Updated this week
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- 极安·斥候(Choo)远程自动化信息收集与风险评估系统☆20Apr 7, 2024Updated last year
- The reference implementation of the SPEAR ranking algorithm in Python.☆37Oct 6, 2015Updated 10 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆44Sep 23, 2021Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- HTTP middleware libraries implemented by http-wasm WebAssembly Guest modules☆37Oct 4, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Detection of malicious domain names using machine learning and deep learning models☆16Nov 6, 2018Updated 7 years ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month
- ☆25Aug 1, 2024Updated last year
- [TACL] Code for "Red Teaming Language Model Detectors with Language Models"☆24Nov 24, 2023Updated 2 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- Demo of using WASM to sandbox Plotly execution☆19Mar 30, 2025Updated last year