BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆152Updated last year
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- ☆127Updated last week
- source code for the offsecml framework☆44Updated last year
- Integrate PyRIT in existing tools☆44Updated 10 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated last week
- A research project to add some brrrrrr to Burp☆196Updated 11 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- ☆72Updated last month
- ☆21Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 8 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 8 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆222Updated this week
- An automated security testing platform that uses Large Language Models (LLMs) to autonomously solve CTF challenges and penetration testin…☆190Updated this week
- Payloads for Attacking Large Language Models☆116Updated 7 months ago
- Payloads for AI Red Teaming and beyond☆315Updated 4 months ago
- ☆109Updated 5 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- A LLM explicitly designed for getting hacked☆164Updated 2 years ago
- using ML models for red teaming☆45Updated 2 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆40Updated 3 months ago
- ☆233Updated 3 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆262Updated 3 months ago
- ☆83Updated last month
- All things specific to LLM Red Teaming Generative AI☆29Updated last year
- Data Scientists Go To Jupyter☆68Updated 10 months ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆37Updated 3 weeks ago
- ☆44Updated last year
- LLM Testing Findings Templates☆75Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆108Updated 7 months ago
- An example vulnerable app that integrates an LLM☆26Updated last year