JosephTLucas / HackThisAILinks
Adversarial Machine Learning (AML) Capture the Flag (CTF)
☆103Updated last year
Alternatives and similar repositories for HackThisAI
Users that are interested in HackThisAI are comparing it to the libraries listed below
Sorting:
- CTF challenges designed and implemented in machine learning applications☆162Updated 11 months ago
- A LLM explicitly designed for getting hacked☆155Updated 2 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆293Updated 11 months ago
- ☆305Updated last month
- Payloads for Attacking Large Language Models☆92Updated 2 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- LLM Testing Findings Templates☆72Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆151Updated 8 months ago
- source code for the offsecml framework☆41Updated last year
- ☆139Updated 2 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆100Updated 2 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆38Updated 5 years ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆347Updated last week
- ☆61Updated 2 weeks ago
- Collection of writeups on ICS/SCADA security.☆180Updated 4 months ago
- A collection of awesome resources related AI security☆278Updated last week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆123Updated 7 months ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆33Updated last year
- ☆45Updated this week
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆106Updated last week
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Updated last year
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆113Updated 2 years ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆65Updated last year
- ctfcli is a tool to manage Capture The Flag events and challenges☆194Updated 3 months ago
- Dropbox LLM Security research code and results☆231Updated last year
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆129Updated 2 weeks ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆244Updated 3 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆50Updated 9 months ago