☆34Dec 2, 2023Updated 2 years ago
Alternatives and similar repositories for ShareGPTs
Users that are interested in ShareGPTs are comparing it to the libraries listed below
Sorting:
- ☆52Feb 24, 2024Updated 2 years ago
- [Neurips 2025]StegoZip: Enhancing Linguistic Steganography Payload in Practice with Large Language Models☆29Dec 4, 2025Updated 3 months ago
- [NeurIPS 2025] Mask Image Watermarking (Official Implementation)☆45Nov 9, 2025Updated 4 months ago
- ☆21Jul 26, 2025Updated 7 months ago
- [ACL2024-Main] Data and Code for WaterBench: Towards Holistic Evaluation of LLM Watermarks☆30Nov 14, 2023Updated 2 years ago
- A provably secure disambiguating steganography method based on grouping ambiguous pools and synchronous sampling.☆16Apr 24, 2025Updated 10 months ago
- ☆15Jun 26, 2023Updated 2 years ago
- ☆28Oct 14, 2021Updated 4 years ago
- Provably Secure Steganography in Practice Based on “Distribution Copies”☆42Jun 1, 2025Updated 9 months ago
- A Multi Functional Tool Kit For Hackers And Programmers In Python Language Including Information Gathering,BruteForce Attack,Social Media…☆10Nov 26, 2023Updated 2 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆31Oct 15, 2024Updated last year
- Provably Secure Steganography☆14Sep 13, 2025Updated 6 months ago
- ☆38Jan 30, 2024Updated 2 years ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- ☆14Aug 7, 2025Updated 7 months ago
- ☆14Jun 12, 2015Updated 10 years ago
- ☆13Jun 10, 2018Updated 7 years ago
- ☆13Feb 21, 2025Updated last year
- ☆14Jan 11, 2024Updated 2 years ago
- Official repository for the paper "Gradient-based Jailbreak Images for Multimodal Fusion Models" (https//arxiv.org/abs/2410.03489)☆19Oct 22, 2024Updated last year
- the leaked prompts from the best performing gpts☆16Feb 23, 2024Updated 2 years ago
- [NeurIPS 2025] The official implementation of "T2SMark: Balancing Robustness and Diversity in Noise-as-Watermark for Diffusion Models"☆45Nov 2, 2025Updated 4 months ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- The place for RIZZ☆11Mar 10, 2025Updated last year
- [ICLR 2026] The implementation of paper "AlphaSteer: Learning Refusal Steering with Principled Null-Space Constraint"☆43Nov 20, 2025Updated 4 months ago
- [NDSS'25] The official implementation of safety misalignment.☆17Jan 8, 2025Updated last year
- This is vimscript for google tasks☆16Feb 21, 2013Updated 13 years ago
- SampDetox: Black-box Backdoor Defense via Perturbation-based Sample Detoxification☆14Jun 10, 2025Updated 9 months ago
- The Ultimate ChatGPT Guide with React Native - Develop Mobile Apps, published by Packt☆18Jul 26, 2024Updated last year
- [EMNLP 2025] Reasoning-to-Defend: Safety-Aware Reasoning Can Defend Large Language Models from Jailbreaking☆12Aug 22, 2025Updated 6 months ago
- The last list of free AI you will need☆57Sep 17, 2025Updated 6 months ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- ☆46Sep 24, 2023Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- multi-bit language model watermarking (NAACL 24)☆17Sep 20, 2024Updated last year
- This is a tool for bug hunters☆18Oct 16, 2025Updated 5 months ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- [TPAMI 2026] Enhancing MMDiT-Based Text-to-Image Models for Similar Subject Generation☆11Mar 7, 2026Updated last week