Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024
☆22May 10, 2024Updated last year
Alternatives and similar repositories for LLM-SECURITY
Users that are interested in LLM-SECURITY are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- yolosegment2labelme - a Python package that allows you to convert YOLO segmentation prediction results to LabelMe and anylabeling JSON fo…☆10May 8, 2024Updated last year
- Code Repository for Blog - How to Productionize Large Language Models (LLMs)☆12Mar 27, 2024Updated 2 years ago
- RAG Based LLM Chatbot Built using Open Source Stack (Llama 3.2 Model, BGE Embeddings, and Qdrant running locally within a Docker Containe…☆17Jan 9, 2025Updated last year
- Multi-Agent AI App from Scratch in python without any depedency of framework☆15Jan 7, 2025Updated last year
- ☆16Jan 5, 2017Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- Interactive reference guide for pentesting DevOps pipelines. 60+ tools with attack vectors. Credits: Tom & Colbert from Accenture (Fusion…☆38Oct 8, 2025Updated 5 months ago
- LLM security and privacy☆54Oct 15, 2024Updated last year
- An intelligent agent utilizing Large Language Models (LLMs) for automated financial news retrieval and stock price prediction.☆21Sep 9, 2024Updated last year
- Bug Bounty statistics tool.☆33Nov 17, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Exercise Solutions of Introduction to Modern Cryptography (2nd edition) written by Jonathan Katz and Yehuda Lindell☆23Jul 7, 2020Updated 5 years ago
- ☆17Oct 15, 2024Updated last year
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- META LLAMA3 GENAI Real World UseCases End To End Implementation Guide☆26Sep 24, 2024Updated last year
- ☆13Sep 12, 2024Updated last year
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Framework for LLM evaluation, guardrails and security☆115Sep 9, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect …☆33Jul 27, 2024Updated last year
- I have explained how to create superior RAG pipeline for complex pdfs using LlamaParse. We can extract text and tables from pdf and QA on…☆49Feb 27, 2024Updated 2 years ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 3 weeks ago
- ☆10Mar 13, 2023Updated 3 years ago
- Build your own cloud virtual machine lab☆13Nov 25, 2025Updated 4 months ago
- Material for the series of seminars on Large Language Models☆34Apr 21, 2024Updated last year
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Netwo…☆20Feb 26, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Threat Modelling Assets (STRIDE, DREAD, etc. cheat sheets)☆13Apr 16, 2020Updated 5 years ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- Advanced Retrieval-Augmented Generation (RAG) through practical notebooks, using the power of the Langchain, OpenAI GPTs ,META LLAMA3 , A…☆105May 1, 2024Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆170Oct 13, 2023Updated 2 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆34Mar 7, 2022Updated 4 years ago
- ☆12Dec 22, 2025Updated 3 months ago