BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆138Updated 9 months ago
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆79Updated this week
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- source code for the offsecml framework☆41Updated last year
- ☆75Updated last week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆77Updated 5 months ago
- Verizon Burp Extensions: AI Suite☆138Updated 5 months ago
- ☆56Updated last week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- Payloads for Attacking Large Language Models☆101Updated 4 months ago
- using ML models for red teaming☆44Updated 2 years ago
- A research project to add some brrrrrr to Burp☆191Updated 7 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆74Updated last week
- Integrate PyRIT in existing tools☆36Updated 7 months ago
- Data Scientists Go To Jupyter☆66Updated 7 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated 2 weeks ago
- ☆19Updated 9 months ago
- LLM Testing Findings Templates☆73Updated last year
- ☆71Updated last month
- An example vulnerable app that integrates an LLM☆24Updated last year
- Reference notes for Attacking and Defending Generative AI presentation☆66Updated last year
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- Payloads for AI Red Teaming and beyond☆284Updated last month
- All things specific to LLM Red Teaming Generative AI☆29Updated 11 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 4 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆165Updated last year
- https://arxiv.org/abs/2412.02776☆61Updated 10 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆60Updated 5 months ago
- Arxiv + Notion Sync☆20Updated 4 months ago
- ☆17Updated last year
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆32Updated 11 months ago