Learn about a type of vulnerability that specifically targets machine learning models
☆413Feb 25, 2026Updated last week
Alternatives and similar repositories for awesome-prompt-injection
Users that are interested in awesome-prompt-injection are comparing it to the libraries listed below
Sorting:
- A curated list of security card games.☆159Jun 2, 2025Updated 9 months ago
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆248Dec 29, 2025Updated 2 months ago
- A curated list of awesome tools, research, papers and other projects related to password cracking and password security.☆898Jun 6, 2025Updated 9 months ago
- Prompt Injections Everywhere☆191Aug 2, 2024Updated last year
- ☆29Jul 6, 2023Updated 2 years ago
- Curating the best DevSecOps resources and tooling.☆1,637Aug 2, 2024Updated last year
- A curated list of awesome malware persistence tools and resources.☆274Oct 3, 2025Updated 5 months ago
- A curated list of awesome things related to Suricata☆221Nov 21, 2025Updated 3 months ago
- A curated list of awesome embedded and IoT security resources.☆2,234Oct 17, 2023Updated 2 years ago
- ☆11May 7, 2019Updated 6 years ago
- a security scanner for custom LLM applications☆1,140Dec 1, 2025Updated 3 months ago
- Proactive, Open source API security → API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom te…☆1,454Updated this week
- Code to generate NeuralExecs (prompt injection for LLMs)☆27Oct 5, 2025Updated 5 months ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,779Aug 9, 2025Updated 7 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- New ways of breaking app-integrated LLMs☆2,055Jul 17, 2025Updated 7 months ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,177Jul 15, 2024Updated last year
- This repository is dedicated to providing comprehensive mappings of the OWASP Top 10 vulnerabilities for Large Language Models (LLMs) to …☆31Feb 15, 2024Updated 2 years ago
- Every practical and proposed defense against prompt injection.☆645Feb 22, 2025Updated last year
- 🕶 A high-level overview of the EVM security ecosystem☆192Jun 6, 2022Updated 3 years ago
- Codebase of https://arxiv.org/abs/2410.14923☆54Oct 22, 2024Updated last year
- Payloads for Attacking Large Language Models☆128Jan 13, 2026Updated last month
- prompt attack-defense, prompt Injection, reverse engineering notes and examples | 提示词对抗、破解例子与笔记☆293Feb 25, 2025Updated last year
- This repository provides a benchmark for prompt injection attacks and defenses in LLMs☆396Oct 29, 2025Updated 4 months ago
- the LLM vulnerability scanner☆7,164Updated this week
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- A repo for generating random NFTs with metadata 100% on chain!☆37Mar 8, 2024Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- ChatGPT Jailbreaks, GPT Assistants Prompt Leaks, GPTs Prompt Injection, LLM Prompt Security, Super Prompts, Prompt Hack, Prompt Security,…☆3,706Updated this week
- A utility to inspect, validate, sign and verify machine learning model files.☆66Feb 5, 2025Updated last year
- 🐶 A curated list of Web Security materials and resources.☆13,144Feb 27, 2026Updated last week
- A curated list of tools for incident response☆8,842Jul 18, 2024Updated last year
- Smart Sessions with EIP-7702 EOA☆16Nov 15, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- A curated list of CTF frameworks, libraries, resources and softwares☆11,312Jul 22, 2024Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,148Dec 19, 2025Updated 2 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- A curated list of awesome resources related to executable packing☆1,543Feb 14, 2026Updated 3 weeks ago