BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆142Updated 10 months ago
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- ☆85Updated last week
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆83Updated this week
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 5 months ago
- source code for the offsecml framework☆42Updated last year
- ☆58Updated 2 weeks ago
- Verizon Burp Extensions: AI Suite☆139Updated 6 months ago
- ☆20Updated 10 months ago
- A research project to add some brrrrrr to Burp☆194Updated 8 months ago
- Integrate PyRIT in existing tools☆37Updated 7 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 5 months ago
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆135Updated last week
- LLM Testing Findings Templates☆74Updated last year
- All things specific to LLM Red Teaming Generative AI☆29Updated last year
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- using ML models for red teaming☆44Updated 2 years ago
- Data Scientists Go To Jupyter☆67Updated 7 months ago
- Proximity is a MCP security scanner powered with NOVA☆53Updated 3 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆253Updated last month
- Payloads for AI Red Teaming and beyond☆293Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 4 months ago
- Arxiv + Notion Sync☆20Updated 5 months ago
- ☆73Updated 2 months ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆88Updated 4 months ago
- ☆99Updated 2 weeks ago
- ☆17Updated 6 months ago
- Autonomous AI C2☆32Updated last year
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆122Updated last month
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆73Updated last year