AhsanAyub / malicious-prompt-detectionView external linksLinks
Detection of malicious prompts used to exploit large language models (LLMs) by leveraging supervised machine learning classifiers.
☆20Oct 30, 2024Updated last year
Alternatives and similar repositories for malicious-prompt-detection
Users that are interested in malicious-prompt-detection are comparing it to the libraries listed below
Sorting:
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆23Nov 12, 2025Updated 3 months ago
- VANET using OMNET++, SUMO, Open Street Map, Veins, Inet☆11May 14, 2024Updated last year
- [ACL 2025] The official implementation of the paper "PIGuard: Prompt Injection Guardrail via Mitigating Overdefense for Free".☆59Dec 4, 2025Updated 2 months ago
- BLEU Score in Rust☆12Jan 1, 2026Updated last month
- Joe Zbiciak Intellivision Emulator☆13May 25, 2014Updated 11 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year
- ☆15Aug 14, 2024Updated last year
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- groupcache is a caching and cache-filling library, intended as a replacement for memcached in many cases.☆11Apr 3, 2024Updated last year
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- ☆12Aug 12, 2024Updated last year
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- Codes for our paper "AgentMonitor: A Plug-and-Play Framework for Predictive and Secure Multi-Agent Systems"☆13Dec 13, 2024Updated last year
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- ☆14Apr 4, 2019Updated 6 years ago
- [Arxiv 2025] Official code and datasets of paper: GNNs as Predictors of Agentic Workflow Performances☆21Jan 15, 2026Updated last month
- SysFlow collection probe☆16Nov 11, 2025Updated 3 months ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- x86 Microkernel☆15Apr 1, 2020Updated 5 years ago
- ☆14Sep 11, 2023Updated 2 years ago
- Software for rendering statemaps☆20Jun 23, 2025Updated 7 months ago
- ☆34Feb 11, 2025Updated last year
- Projects based on Machine Learning☆10May 8, 2020Updated 5 years ago
- A packer plugin for OpenBSD's vmm☆12Nov 15, 2018Updated 7 years ago
- Hosted analyzers built for Grapl☆14Dec 26, 2022Updated 3 years ago
- ☆14Jun 7, 2024Updated last year
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Using RAG to generate data for model fine-tuning.☆13Apr 16, 2025Updated 10 months ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Demo of using WASM to sandbox Plotly execution☆19Mar 30, 2025Updated 10 months ago
- Python package for virtual screening of generated molecules using autodock-vina and tensorflow☆14Mar 22, 2021Updated 4 years ago
- Docker container for an OCaml + OPAM setup☆24Nov 28, 2016Updated 9 years ago
- ☆17Aug 15, 2024Updated last year
- Automated build and mirror of eBPF kernel probes for use as a driver with the Falco runtime security agent (https://falco.org/)☆15Nov 18, 2024Updated last year
- Shows how to create basic image adversaries, and train adversarially robust image classifiers (to some extent).☆13Oct 14, 2020Updated 5 years ago