BishopFox / BrokenHillLinks
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
☆123Updated 7 months ago
Alternatives and similar repositories for BrokenHill
Users that are interested in BrokenHill are comparing it to the libraries listed below
Sorting:
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆66Updated this week
- source code for the offsecml framework☆41Updated last year
- ☆61Updated last week
- ☆45Updated this week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆75Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated 2 months ago
- Verizon Burp Extensions: AI Suite☆132Updated 3 months ago
- Payloads for Attacking Large Language Models☆92Updated 2 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆42Updated last week
- A research project to add some brrrrrr to Burp☆181Updated 5 months ago
- Integrate PyRIT in existing tools☆29Updated 5 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆64Updated last year
- LLM Testing Findings Templates☆72Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆242Updated 3 months ago
- using ML models for red teaming☆43Updated last year
- Payloads for AI Red Teaming and beyond☆221Updated last week
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆57Updated 3 months ago
- ☆15Updated 7 months ago
- A LLM explicitly designed for getting hacked☆155Updated 2 years ago
- Autonomous AI C2☆31Updated last year
- Data Scientists Go To Jupyter☆63Updated 5 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆79Updated 2 weeks ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆98Updated 2 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆54Updated 4 months ago
- ☆32Updated 3 months ago
- ☆16Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆99Updated 2 weeks ago
- NOVA: The Prompt Pattern Matching☆144Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated last year