HKU-TASR / Imperio
[IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the victim model's prediction for arbitrary targets.
☆42Updated 9 months ago
Alternatives and similar repositories for Imperio:
Users that are interested in Imperio are comparing it to the libraries listed below
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆79Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆98Updated 11 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 4 months ago
- General research for Dreadnode☆19Updated 7 months ago
- ☆27Updated last year
- ☆28Updated last month
- A compact toolbox for backdoor attacks and defenses.☆157Updated 6 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆33Updated 10 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 10 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated 11 months ago
- ☆26Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆19Updated 3 months ago
- ☆12Updated 5 months ago
- ☆20Updated 3 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- ☆51Updated last month
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆15Updated 9 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 10 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 7 months ago
- ☆10Updated 2 months ago
- AI Powered Sensitive Information Detection☆17Updated 10 months ago
- using ML models for red teaming☆39Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Updated last year
- Mass Exploit - CVE-2024-29824 - Ivanti EPM - Remote Code Execution (RCE)☆29Updated 6 months ago
- Check for the existence of an email on Google platforms☆12Updated 9 months ago
- AI modular structure that provides automation-based attack and penetration☆14Updated 8 months ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆38Updated last year