BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆143Updated 10 months ago
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- ☆100Updated 2 weeks ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- source code for the offsecml framework☆42Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆88Updated last week
- ☆62Updated last week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆79Updated 6 months ago
- Integrate PyRIT in existing tools☆39Updated 8 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆144Updated this week
- Payloads for Attacking Large Language Models☆104Updated 5 months ago
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 6 months ago
- ☆20Updated 10 months ago
- A LLM explicitly designed for getting hacked☆163Updated 2 years ago
- An example vulnerable app that integrates an LLM☆24Updated last year
- using ML models for red teaming☆44Updated 2 years ago
- LLM Testing Findings Templates☆75Updated last year
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆73Updated last year
- ☆17Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆104Updated 5 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆67Updated 7 months ago
- Payloads for AI Red Teaming and beyond☆302Updated 2 months ago
- Data Scientists Go To Jupyter☆67Updated 8 months ago
- AI agent for autonomous cyber operations☆354Updated this week
- Proximity is a MCP security scanner powered with NOVA☆211Updated last month
- Example agents for the Dreadnode platform☆19Updated 2 weeks ago
- Protection against HTML smuggling attacks.☆99Updated 4 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆126Updated last month