BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆128Updated 8 months ago
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- ☆63Updated 2 weeks ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆74Updated this week
- source code for the offsecml framework☆41Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆77Updated 3 months ago
- Verizon Burp Extensions: AI Suite☆137Updated 4 months ago
- A research project to add some brrrrrr to Burp☆185Updated 6 months ago
- Integrate PyRIT in existing tools☆33Updated 5 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated 3 months ago
- ☆52Updated last week
- Payloads for Attacking Large Language Models☆96Updated 2 months ago
- ☆15Updated 8 months ago
- using ML models for red teaming☆44Updated 2 years ago
- Reference notes for Attacking and Defending Generative AI presentation☆64Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆247Updated 4 months ago
- ☆66Updated last week
- Payloads for AI Red Teaming and beyond☆253Updated last month
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- LLM Testing Findings Templates☆72Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆58Updated this week
- ☆17Updated last year
- Autonomous AI C2☆31Updated last year
- A LLM explicitly designed for getting hacked☆158Updated 2 years ago
- ☆17Updated 4 months ago
- https://arxiv.org/abs/2412.02776☆59Updated 8 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Code snippets to reproduce MCP tool poisoning attacks.☆177Updated 4 months ago
- Example agents for the Dreadnode platform☆15Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆48Updated 4 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year