JosephTLucas / HackThisAILinks
Adversarial Machine Learning (AML) Capture the Flag (CTF)
☆113Updated last year
Alternatives and similar repositories for HackThisAI
Users that are interested in HackThisAI are comparing it to the libraries listed below
Sorting:
- CTF challenges designed and implemented in machine learning applications☆199Updated 3 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Updated last year
- A LLM explicitly designed for getting hacked☆166Updated 2 years ago
- Payloads for Attacking Large Language Models☆118Updated 2 weeks ago
- ☆355Updated 7 months ago
- An automated security testing platform that uses Large Language Models (LLMs) to autonomously solve CTF challenges and penetration testin…☆192Updated this week
- ☆155Updated 4 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆158Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Updated 6 months ago
- ☆134Updated last week
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆211Updated 2 months ago
- Collection of writeups on ICS/SCADA security.☆193Updated 3 months ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆37Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆109Updated 2 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Updated 5 years ago
- LLM Testing Findings Templates☆75Updated last year
- ☆79Updated last month
- Data Scientists Go To Jupyter☆68Updated 10 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 4 months ago
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆420Updated 5 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆152Updated last year
- A curated list of large language model tools for cybersecurity research.☆480Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆57Updated last year
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆59Updated 2 years ago
- Gonna share my writeups and resources here☆71Updated last year
- Collection of all previous 1337UP CTF challenges.☆79Updated last year
- Official writeups for Hack The Boo CTF 2023☆45Updated last year
- ☆44Updated last year