BishopFox / BrokenHill
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆91Updated 3 months ago
Alternatives and similar repositories for BrokenHill:
Users that are interested in BrokenHill are comparing it to the libraries listed below
- ☆27Updated 2 months ago
- Integrate PyRIT in existing tools☆17Updated 3 weeks ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last year
- using ML models for red teaming☆43Updated last year
- source code for the offsecml framework☆38Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆105Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆67Updated last month
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆19Updated 3 months ago
- Payloads for Attacking Large Language Models☆77Updated 8 months ago
- A research project to add some brrrrrr to Burp☆147Updated last month
- A LLM explicitly designed for getting hacked☆139Updated last year
- The Arcanum Prompt Injection Taxonomy☆55Updated 3 weeks ago
- LLM Testing Findings Templates☆70Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆62Updated 2 weeks ago
- Data Scientists Go To Jupyter☆62Updated 3 weeks ago
- ☆203Updated last year
- Codebase of https://arxiv.org/abs/2410.14923☆44Updated 5 months ago
- ☆10Updated 3 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 7 months ago
- A collection of prompt injection mitigation techniques.☆20Updated last year
- ☆37Updated 3 months ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆65Updated 3 months ago
- Top 10 for Agentic AI (AI Agent Security) - Pre-release version☆72Updated 3 weeks ago
- Automated vulnerability discovery and annotation☆65Updated 8 months ago
- https://arxiv.org/abs/2412.02776☆51Updated 3 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆60Updated 9 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 4 months ago
- ☆16Updated 11 months ago
- Autonomous AI C2☆30Updated 8 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆55Updated last month