HKU-TASR / Imperio
[IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the victim model's prediction for arbitrary targets.
☆41Updated 2 months ago
Alternatives and similar repositories for Imperio:
Users that are interested in Imperio are comparing it to the libraries listed below
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆85Updated 11 months ago
- Adversarial Tokenization☆22Updated this week
- General research for Dreadnode☆21Updated 10 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆107Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆10Updated 5 months ago
- ☆33Updated 7 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆108Updated 4 months ago
- keep watching new bug bounty (vulnerability) postings.☆13Updated last year
- ☆28Updated last year
- ☆13Updated 4 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆26Updated 9 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 6 months ago
- using ML models for red teaming☆43Updated last year
- https://arxiv.org/abs/2412.02776☆52Updated 5 months ago
- ☆16Updated last year
- ☆15Updated 3 weeks ago
- A compact toolbox for backdoor attacks and defenses.☆174Updated 9 months ago
- ☆61Updated 5 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆46Updated last week
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆13Updated 5 months ago
- Exploits Unauth Docker API☆40Updated 2 weeks ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆29Updated 3 weeks ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year