JosephTLucas / HackThisAILinks
Adversarial Machine Learning (AML) Capture the Flag (CTF)
☆108Updated last year
Alternatives and similar repositories for HackThisAI
Users that are interested in HackThisAI are comparing it to the libraries listed below
Sorting:
- CTF challenges designed and implemented in machine learning applications☆176Updated 3 weeks ago
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆304Updated last year
- ☆337Updated 4 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- ☆151Updated last month
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆140Updated this week
- Data Scientists Go To Jupyter☆67Updated 7 months ago
- Code repository for "Machine Learning For Red Team Hackers".☆40Updated 5 years ago
- A research project to add some brrrrrr to Burp☆194Updated 8 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆157Updated 10 months ago
- A collection of awesome resources related AI security☆332Updated last month
- source code for the offsecml framework☆42Updated last year
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆390Updated 2 months ago
- LLM Testing Findings Templates☆74Updated last year
- ☆35Updated 2 years ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆253Updated last month
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆163Updated last month
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 3 months ago
- Collection of writeups on ICS/SCADA security.☆185Updated last week
- The most complete code auditing platform with thousands of real-world challenges☆130Updated 4 months ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆34Updated last year
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆133Updated last week
- CALDERA plugin for adversary emulation of AI-enabled systems☆103Updated 2 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- A script to download all the challenges and files from the CTFd instance.☆59Updated 4 months ago
- Collection of all previous 1337UP CTF challenges.☆75Updated 9 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆142Updated 10 months ago
- An environment for testing AI agents against networks using Metasploit.☆45Updated 2 years ago