BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆133Updated 8 months ago
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- ☆66Updated last week
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆77Updated this week
- source code for the offsecml framework☆41Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 4 months ago
- Verizon Burp Extensions: AI Suite☆138Updated 4 months ago
- Integrate PyRIT in existing tools☆35Updated 6 months ago
- Payloads for Attacking Large Language Models☆99Updated 3 months ago
- ☆53Updated this week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- ☆18Updated 8 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated 4 months ago
- using ML models for red teaming☆44Updated 2 years ago
- A research project to add some brrrrrr to Burp☆187Updated 7 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆61Updated last week
- Example agents for the Dreadnode platform☆16Updated last month
- Data Scientists Go To Jupyter☆66Updated 6 months ago
- ☆71Updated last month
- Reference notes for Attacking and Defending Generative AI presentation☆65Updated last year
- LLM Testing Findings Templates☆72Updated last year
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆68Updated last year
- Payloads for AI Red Teaming and beyond☆274Updated 2 weeks ago
- ☆17Updated last year
- All things specific to LLM Red Teaming Generative AI☆28Updated 10 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆58Updated 5 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆31Updated last month
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆120Updated last month
- Automated vulnerability discovery and annotation☆67Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆133Updated last week