BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆152Updated last year
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- ☆123Updated this week
- Tree of Attacks (TAP) Jailbreaking Implementation☆116Updated last year
- source code for the offsecml framework☆46Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated last week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 7 months ago
- ☆21Updated last year
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- Integrate PyRIT in existing tools☆43Updated 9 months ago
- ☆70Updated 2 weeks ago
- A LLM explicitly designed for getting hacked☆165Updated 2 years ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆187Updated this week
- Payloads for Attacking Large Language Models☆114Updated 6 months ago
- Payloads for AI Red Teaming and beyond☆311Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆54Updated 7 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆107Updated 6 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆210Updated last week
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 3 months ago
- using ML models for red teaming☆45Updated 2 years ago
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆43Updated 2 weeks ago
- Reference notes for Attacking and Defending Generative AI presentation☆68Updated last year
- https://arxiv.org/abs/2412.02776☆67Updated last year
- ☆194Updated 2 weeks ago
- An example vulnerable app that integrates an LLM☆25Updated last year
- LLM Testing Findings Templates☆75Updated last year
- ☆185Updated last month
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆39Updated 3 months ago
- An archive of 0day.today exploits☆321Updated 5 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆80Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆68Updated 8 months ago