JosephTLucas / jupysecLinks
A JupyterLab extension to evaluate the security of your Jupyter environment
☆39Updated 2 years ago
Alternatives and similar repositories for jupysec
Users that are interested in jupysec are comparing it to the libraries listed below
Sorting:
- A toolkit for detecting and protecting against vulnerabilities in Large Language Models (LLMs).☆142Updated last year
- ☆70Updated 2 months ago
- Code for the paper "Defeating Prompt Injections by Design"☆94Updated 2 months ago
- Lightweight LLM Interaction Framework☆367Updated this week
- A security-first linter for code that shouldn't need linting☆16Updated last year
- Machine Learning Attack Series☆68Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆54Updated 3 months ago
- Test Software for the Characterization of AI Technologies☆261Updated last week
- A utility to inspect, validate, sign and verify machine learning model files.☆58Updated 6 months ago
- List of ML file formats☆59Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 3 months ago
- ComPromptMized: Unleashing Zero-click Worms that Target GenAI-Powered Applications☆203Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆80Updated 6 months ago
- ATLAS tactics, techniques, and case studies data☆77Updated 2 weeks ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- BlindBox is a tool to isolate and deploy applications inside Trusted Execution Environments for privacy-by-design apps☆61Updated last year
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆58Updated 2 years ago
- using ML models for red teaming☆44Updated 2 years ago
- Dropbox LLM Security research code and results☆233Updated last year
- Practical examples of "Flawed Machine Learning Security" together with ML Security best practice across the end to end stages of the mach…☆115Updated 3 years ago
- Use LLMs for document ranking☆145Updated 4 months ago
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- My inputs for the LLM Gandalf made by Lakera☆47Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆32Updated last year
- Payloads for Attacking Large Language Models☆96Updated 2 months ago
- Security and compliance proxy for LLM APIs☆48Updated 2 years ago
- Example agents for the Dreadnode platform☆16Updated last month
- Automated vulnerability discovery and annotation☆67Updated last year
- ☆52Updated 2 weeks ago
- Project LLM Verification Standard☆48Updated 3 months ago