BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆150Updated 11 months ago
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- ☆110Updated this week
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated last week
- source code for the offsecml framework☆43Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆81Updated 7 months ago
- ☆21Updated 11 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆172Updated this week
- Integrate PyRIT in existing tools☆42Updated 9 months ago
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- ☆64Updated last week
- Verizon Burp Extensions: AI Suite☆141Updated 7 months ago
- Payloads for Attacking Large Language Models☆109Updated 6 months ago
- Payloads for AI Red Teaming and beyond☆304Updated 3 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆95Updated this week
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- A LLM explicitly designed for getting hacked☆163Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 6 months ago
- using ML models for red teaming☆44Updated 2 years ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆68Updated 7 months ago
- ☆80Updated 3 months ago
- Data Scientists Go To Jupyter☆67Updated 9 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆129Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆105Updated 6 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 2 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- LLM Testing Findings Templates☆75Updated last year
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆32Updated last year
- All things specific to LLM Red Teaming Generative AI☆29Updated last year
- ☆18Updated 7 months ago
- ☆82Updated 2 weeks ago