BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆120Updated 6 months ago
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- ☆51Updated last week
- Integrate PyRIT in existing tools☆28Updated 3 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- A research project to add some brrrrrr to Burp☆178Updated 4 months ago
- source code for the offsecml framework☆40Updated last year
- Verizon Burp Extensions: AI Suite☆131Updated 2 months ago
- ☆14Updated 6 months ago
- The Arcanum Prompt Injection Taxonomy☆104Updated last month
- ☆37Updated this week
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆31Updated this week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆73Updated last month
- General research for Dreadnode☆23Updated last year
- ☆41Updated 8 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last month
- LLM Testing Findings Templates☆72Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- A LLM explicitly designed for getting hacked☆152Updated last year
- Prompt Injections Everywhere☆128Updated 10 months ago
- using ML models for red teaming☆43Updated last year
- Payloads for Attacking Large Language Models☆90Updated 3 weeks ago
- Hijack a slack bot to phish your way in☆55Updated 2 months ago
- https://arxiv.org/abs/2412.02776☆57Updated 6 months ago
- An example vulnerable app that integrates an LLM☆21Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 3 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- A collection of prompt injection mitigation techniques.☆23Updated last year
- ☆40Updated 6 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆77Updated last month
- Data Scientists Go To Jupyter☆64Updated 3 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆48Updated 8 months ago