Panda Guard is designed for researching jailbreak attacks, defenses, and evaluation algorithms for large language models (LLMs).
☆66Mar 23, 2026Updated last week
Alternatives and similar repositories for panda-guard
Users that are interested in panda-guard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The 1st Spiking Transformer Benchmark (NeurIPS 2025)☆19Dec 29, 2025Updated 3 months ago
- Official GitHub repository for the paper "Adversarial Attacks on Robotic Vision Language Action Models"☆30May 28, 2025Updated 10 months ago
- Code Implementation of Adversarial Prompt Evaluation paper☆14Sep 18, 2025Updated 6 months ago
- ☆125Feb 3, 2025Updated last year
- The official repository for guided jailbreak benchmark☆29Jul 28, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Official implementation of “Response Attack: Exploiting Contextual Priming to Jailbreak Large Language Models” (AAAI 2026).☆34Mar 22, 2026Updated last week
- ☆61May 21, 2025Updated 10 months ago
- AnyDoor: Test-Time Backdoor Attacks on Multimodal Large Language Models☆61Apr 8, 2024Updated last year
- ☆19May 14, 2025Updated 10 months ago
- This repository contains code from our paper Efficient and Accurate Conversion of Spiking Neural Network with Burst Spikes, published in …☆19Apr 29, 2022Updated 3 years ago
- [NAACL 2022] "SemAttack: Natural Textual Attacks via Different Semantic Spaces" by Boxin Wang, Chejian Xu, Xiangyu Liu, Yu Cheng, Bo Li☆21Jun 11, 2022Updated 3 years ago
- [CVPR2025] T2ISafety: Benchmark for Assessing Fairness, Toxicity, and Privacy in Image Generation☆33Jul 10, 2025Updated 8 months ago
- This repository contains code from our paper "Backpropagation with Biologically Plausible Spatio-Temporal Adjustment For Training Deep Sp…☆32Jun 11, 2022Updated 3 years ago
- Implementation of unregularized, l1 regularized and l2 regularized linear regression using numpy and without sklearn☆12Oct 4, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆10Oct 21, 2024Updated last year
- [ACL 2024] Defending Large Language Models Against Jailbreaking Attacks Through Goal Prioritization☆29Jul 9, 2024Updated last year
- ☆16Sep 1, 2025Updated 6 months ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- ReasoningShield: Safety Detection over Reasoning Traces of Large Reasoning Models☆25Sep 27, 2025Updated 6 months ago
- KnowRL: Exploring Knowledgeable Reinforcement Learning for Factuality☆40Dec 1, 2025Updated 3 months ago
- [ACL 2024] CodeAttack: Revealing Safety Generalization Challenges of Large Language Models via Code Completion☆59Oct 1, 2025Updated 5 months ago
- [ICLR 2022] Boosting Randomized Smoothing with Variance Reduced Classifiers☆11Mar 29, 2022Updated 4 years ago
- Spiking Global-Local Fusion Transformer☆21Apr 27, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆27Jun 11, 2025Updated 9 months ago
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆189Apr 1, 2025Updated 11 months ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆66Aug 25, 2024Updated last year
- ☆10Jun 5, 2021Updated 4 years ago
- The official code of the paper: Semantic-guided Multi-mask Image Harmonization (ECCV2022)☆15Jul 20, 2022Updated 3 years ago
- ☆24May 23, 2025Updated 10 months ago
- [DATE'2025, TCAD'2025] Terafly : A Multi-Node FPGA Based Accelerator Design for Efficient Cooperative Inference in LLMs☆32Nov 13, 2025Updated 4 months ago
- [NeurIPS 2023] and [ICLR 2024] for robustness certification.☆10Nov 30, 2024Updated last year
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆20Apr 23, 2024Updated last year
- 2019年全国大学生电子设计大赛G题双路语音调频接收机的FPGA全实现☆18Apr 15, 2020Updated 5 years ago
- [ICML 2025] An official source code for paper "FlipAttack: Jailbreak LLMs via Flipping".☆170May 2, 2025Updated 10 months ago
- Shadow Alignment: The Ease of Subverting Safely-Aligned Language Models☆35Oct 19, 2023Updated 2 years ago
- ☆36Aug 28, 2025Updated 7 months ago
- Casande-RL☆11May 9, 2023Updated 2 years ago
- From Accuracy to Robustness: A Study of Rule- and Model-based Verifiers in Mathematical Reasoning.☆25Oct 7, 2025Updated 5 months ago