BishopFox / BrokenHill
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆88Updated 2 months ago
Alternatives and similar repositories for BrokenHill:
Users that are interested in BrokenHill are comparing it to the libraries listed below
- source code for the offsecml framework☆37Updated 8 months ago
- ☆37Updated 2 months ago
- Integrate PyRIT in existing tools☆13Updated 2 months ago
- A LLM explicitly designed for getting hacked☆139Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆100Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- ☆199Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆60Updated 2 weeks ago
- Payloads for Attacking Large Language Models☆75Updated 7 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆59Updated 8 months ago
- A research project to add some brrrrrr to Burp☆131Updated 3 weeks ago
- using ML models for red teaming☆42Updated last year
- Codebase of https://arxiv.org/abs/2410.14923☆44Updated 4 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆159Updated last year
- OWASP Top 10 for Agentic AI (AI Agent Security) - Pre-release version☆55Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆93Updated last year
- Data Scientists Go To Jupyter☆62Updated 3 months ago
- LLM Testing Findings Templates☆66Updated last year
- General research for Dreadnode☆19Updated 8 months ago
- A collection of prompt injection mitigation techniques.☆20Updated last year
- ☆16Updated 10 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆45Updated this week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 6 months ago
- ☆36Updated 2 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆47Updated 7 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆51Updated 4 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆53Updated 3 weeks ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆18Updated 2 months ago
- All things specific to LLM Red Teaming Generative AI☆23Updated 4 months ago