Joe-B-Security / awesome-prompt-injectionView external linksLinks
Learn about a type of vulnerability that specifically targets machine learning models
☆406Sep 14, 2025Updated 5 months ago
Alternatives and similar repositories for awesome-prompt-injection
Users that are interested in awesome-prompt-injection are comparing it to the libraries listed below
Sorting:
- A curated list of security card games.☆156Jun 2, 2025Updated 8 months ago
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆245Dec 29, 2025Updated last month
- A curated list of awesome tools, research, papers and other projects related to password cracking and password security.☆849Jun 6, 2025Updated 8 months ago
- ☆29Jul 6, 2023Updated 2 years ago
- Prompt Injections Everywhere☆179Aug 2, 2024Updated last year
- Agentic LLM CTF to test prompt injection attacks and preventions☆27Feb 9, 2026Updated last week
- Curating the best DevSecOps resources and tooling.☆1,625Aug 2, 2024Updated last year
- A curated list of awesome malware persistence tools and resources.☆272Oct 3, 2025Updated 4 months ago
- A curated list of awesome things related to Suricata☆219Nov 21, 2025Updated 2 months ago
- A curated list of awesome embedded and IoT security resources.☆2,222Oct 17, 2023Updated 2 years ago
- ☆11May 7, 2019Updated 6 years ago
- a security scanner for custom LLM applications☆1,126Dec 1, 2025Updated 2 months ago
- Proactive, Open source API security → API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom te…☆1,446Updated this week
- Code to generate NeuralExecs (prompt injection for LLMs)☆27Oct 5, 2025Updated 4 months ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,734Aug 9, 2025Updated 6 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Jul 24, 2023Updated 2 years ago
- New ways of breaking app-integrated LLMs☆2,052Jul 17, 2025Updated 6 months ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,133Jul 15, 2024Updated last year
- This repository is dedicated to providing comprehensive mappings of the OWASP Top 10 vulnerabilities for Large Language Models (LLMs) to …☆29Feb 15, 2024Updated 2 years ago
- Every practical and proposed defense against prompt injection.☆630Feb 22, 2025Updated 11 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆54Oct 22, 2024Updated last year
- Payloads for Attacking Large Language Models☆121Jan 13, 2026Updated last month
- prompt attack-defense, prompt Injection, reverse engineering notes and examples | 提示词对抗、破解例子与笔记☆289Feb 25, 2025Updated 11 months ago
- This repository provides a benchmark for prompt injection attacks and defenses in LLMs☆391Oct 29, 2025Updated 3 months ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Prompt Injection Primer for Engineers☆547Aug 25, 2023Updated 2 years ago
- the LLM vulnerability scanner☆6,989Updated this week
- A repo for generating random NFTs with metadata 100% on chain!☆37Mar 8, 2024Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- Utterly unelegant prompts for local LLMs, with scary results.☆22Aug 22, 2025Updated 5 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆66Feb 5, 2025Updated last year
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆643Dec 10, 2025Updated 2 months ago
- ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security,…☆3,640Nov 12, 2025Updated 3 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- A curated list of tools for incident response☆8,808Jul 18, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆141Jan 2, 2025Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,126Dec 19, 2025Updated last month
- Python code to Serialize and Unserialize java binary serialization format.☆30Jan 9, 2026Updated last month
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago