An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)
☆113Jan 21, 2025Updated last year
Alternatives and similar repositories for PromptAttack
Users that are interested in PromptAttack are comparing it to the libraries listed below
Sorting:
- ☆19Jun 21, 2025Updated 8 months ago
- Official Implementation of "Learning to Refuse: Towards Mitigating Privacy Risks in LLMs"☆10Dec 13, 2024Updated last year
- [ICML 2025] An official source code for paper "FlipAttack: Jailbreak LLMs via Flipping".☆165May 2, 2025Updated 10 months ago
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆187Apr 1, 2025Updated 11 months ago
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆176Dec 18, 2024Updated last year
- [NeurIPS25] Official repo for "Simplicity Prevails: Rethinking Negative Preference Optimization for LLM Unlearning"☆42Oct 3, 2025Updated 5 months ago
- Butler 是一个用于自动化服务管理和任务调度的工具项目。☆16Updated this week
- ☆44Mar 3, 2023Updated 3 years ago
- Efficient and Effective Weight-Ensembling Mixture of Experts for Multi-Task Model Merging. Arxiv, 2024.☆16Oct 28, 2024Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆109Sep 27, 2024Updated last year
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆25May 29, 2024Updated last year
- ☆23Jan 17, 2025Updated last year
- Official repo for NeurIPS'24 paper "WAGLE: Strategic Weight Attribution for Effective and Modular Unlearning in Large Language Models"☆18Dec 16, 2024Updated last year
- ☆23Apr 6, 2019Updated 6 years ago
- The official implementation of our NAACL 2024 paper "A Wolf in Sheep’s Clothing: Generalized Nested Jailbreak Prompts can Fool Large Lang…☆153Sep 2, 2025Updated 6 months ago
- Generated geosite.dat based on Antifilter Community List☆25Updated this week
- We jailbreak GPT-3.5 Turbo’s safety guardrails by fine-tuning it on only 10 adversarially designed examples, at a cost of less than $0.20…☆341Feb 23, 2024Updated 2 years ago
- ☆32Aug 9, 2024Updated last year
- [ICLR 2024]Data for "Multilingual Jailbreak Challenges in Large Language Models"☆99Mar 7, 2024Updated last year
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆66Mar 22, 2025Updated 11 months ago
- ☆25Feb 6, 2024Updated 2 years ago
- Contextualized Perturbation for Textual Adversarial Attack, NAACL 2021☆44Jul 23, 2021Updated 4 years ago
- This is the official code for the paper "Vaccine: Perturbation-aware Alignment for Large Language Models" (NeurIPS2024)☆49Jan 15, 2026Updated last month
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆48Jul 24, 2024Updated last year
- ☆15Dec 11, 2025Updated 2 months ago
- DSN jailbreak Attack & Evaluation Ensemble☆16Feb 7, 2026Updated 3 weeks ago
- A curated collection of papers and related projects on using LLMs for privacy.☆25Oct 8, 2025Updated 4 months ago
- Code for Voice Jailbreak Attacks Against GPT-4o.☆36May 31, 2024Updated last year
- Awesome LLM Jailbreak academic papers☆126Nov 3, 2023Updated 2 years ago
- ☆164Sep 2, 2024Updated last year
- Papers and resources related to the security and privacy of LLMs 🤖☆568Jun 8, 2025Updated 8 months ago
- ☆698Jul 2, 2025Updated 8 months ago
- Code to conduct an embedding attack on LLMs☆31Jan 10, 2025Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆57Aug 17, 2024Updated last year
- Code for Neurips 2024 paper "Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models"☆59Jan 15, 2025Updated last year
- The dataset and code for the ICLR 2024 paper "Can LLM-Generated Misinformation Be Detected?"☆80Nov 9, 2024Updated last year
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆106Apr 15, 2024Updated last year
- ☆14Apr 11, 2024Updated last year