BishopFox / BrokenHill
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆80Updated last month
Alternatives and similar repositories for BrokenHill:
Users that are interested in BrokenHill are comparing it to the libraries listed below
- source code for the offsecml framework☆37Updated 7 months ago
- Integrate PyRIT in existing tools☆13Updated last month
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 10 months ago
- A research project to add some brrrrrr to Burp☆120Updated this week
- Tree of Attacks (TAP) Jailbreaking Implementation☆99Updated 11 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆46Updated 3 months ago
- ☆33Updated last month
- ☆16Updated 9 months ago
- Payloads for Attacking Large Language Models☆72Updated 6 months ago
- using ML models for red teaming☆39Updated last year
- Data Scientists Go To Jupyter☆62Updated 2 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆52Updated 2 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆56Updated this week
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆45Updated 2 months ago
- LLM Testing Findings Templates☆66Updated 11 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 5 months ago
- Automated vulnerability discovery and annotation☆64Updated 6 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆56Updated 7 months ago
- General research for Dreadnode☆19Updated 7 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 3 months ago
- Hijack a slack bot to phish your way in☆43Updated last month
- ☆62Updated last month
- Living Off Security Tools☆43Updated 3 months ago
- ☆64Updated last week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆183Updated 4 months ago
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆17Updated last month
- ☆34Updated last month
- CALDERA plugin for adversary emulation of AI-enabled systems☆87Updated last year
- Dropbox LLM Security research code and results☆219Updated 8 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 6 months ago