JosephTLucas / HackThisAI
Adversarial Machine Learning (AML) Capture the Flag (CTF)
☆92Updated 6 months ago
Related projects: ⓘ
- CTF challenges designed and implemented in machine learning applications☆99Updated 3 weeks ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆147Updated 3 weeks ago
- A LLM explicitly designed for getting hacked☆121Updated last year
- A collection of awesome resources related AI security☆107Updated 5 months ago
- ☆164Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆88Updated 7 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆143Updated 11 months ago
- ☆13Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆190Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆82Updated last year
- Data Scientists Go To Jupyter☆56Updated last year
- OWASP Machine Learning Security Top 10 Project☆69Updated last week
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆53Updated last year
- A script to download all the challenges and files from the CTFd instance.☆41Updated 2 months ago
- ☆89Updated last month
- Official writeups for Business CTF 2024: The Vault Of Hope☆116Updated 3 months ago
- Prompt Injections Everywhere☆68Updated last month
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆88Updated last month
- source code for the offsecml framework☆30Updated 3 months ago
- Payloads for Attacking Large Language Models☆56Updated 2 months ago
- Hack-A-Sat Qualifiers Writeups☆219Updated last year
- Source code and writeups for all challenges☆15Updated 2 years ago
- An environment for testing AI agents against networks using Metasploit.☆36Updated last year
- ☆69Updated 3 months ago
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆24Updated 10 months ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆220Updated last month
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆115Updated this week
- Code for shelLM tool☆41Updated 9 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆127Updated 2 months ago