☆13Dec 28, 2024Updated last year
Alternatives and similar repositories for prompt_injection_attacks
Users that are interested in prompt_injection_attacks are comparing it to the libraries listed below
Sorting:
- NTU SC2002 Group Project - Final Year Project Management System (FYPMS)☆18Aug 12, 2025Updated 6 months ago
- ☆16Nov 8, 2024Updated last year
- A powerful, recursive URL-smart web scraping tool designed to efficiently collect and organize content from websites. This tool is perfec…☆10Jan 11, 2026Updated last month
- Image reconstruction from human brain activity by VAE and adversarial learning☆12May 21, 2022Updated 3 years ago
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 2 years ago
- ☆11Jul 10, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- 🤖 AI Workflow System - Turn your tasks into smart multi-agent workflows with specialized bots for different teams (Dev, PM, QA, etc.) th…☆30Aug 27, 2025Updated 6 months ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- PITS-中日英韩☆12Mar 14, 2023Updated 2 years ago
- A simulation showcasing federated learning with homomorphic encryption☆10Sep 24, 2023Updated 2 years ago
- A central repository for curating and managing diverse datasets used in healthcare applications.☆11Jun 8, 2024Updated last year
- ☆14Mar 9, 2025Updated 11 months ago
- ☆12Sep 18, 2015Updated 10 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- Official repository for Trustworthy Alignment of Retrieval-Augmented Large Language Models via Reinforcement Learning☆12Sep 2, 2024Updated last year
- ☆12Jan 25, 2026Updated last month
- The Python SDK for the Frame from @brilliantlabsAR☆10May 3, 2025Updated 10 months ago
- The aim of this Github repository is to collect and summarise research works on backdoor attacks and defences on deep learning models.☆13Sep 7, 2022Updated 3 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Tools for MRI classification of Alzheimer's disease using 3D CNN networks☆10Jul 24, 2023Updated 2 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- Julia rules for semgrep☆14Dec 9, 2025Updated 2 months ago
- ☆45Updated this week
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- State-Relabeling Adversarial Active Learning☆14Aug 17, 2021Updated 4 years ago
- ☆17Mar 10, 2024Updated last year
- Build and publish Docker images, run builds/tasks within Docker containers or on remote hosts.☆16Feb 25, 2026Updated last week
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- Bithoven is a smart contract language for composing powerful and secure instruments on Bitcoin. LR(1) parser with static analysis for com…☆41Feb 25, 2026Updated last week
- ☆13Apr 13, 2025Updated 10 months ago
- ☆15Aug 4, 2020Updated 5 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- Simple TR64 UPnP: A simple way to talk to your UPnP and/or TR64 protocol devices☆11Mar 13, 2021Updated 4 years ago
- Unlike vanilla contextual pre-trained fundamentally \textit{small} language models (e.g., ClinicalBERT), our interest lies in compressed …☆24Apr 24, 2025Updated 10 months ago