LLM-Integrity-Guard / JailMineLinks
☆19Updated last year
Alternatives and similar repositories for JailMine
Users that are interested in JailMine are comparing it to the libraries listed below
Sorting:
- ASCII-generator in Go☆18Updated 8 months ago
- ☆82Updated 3 months ago
- Modified qemu for binary-only kernel tracing, address sanitizer and so on☆19Updated 5 months ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆23Updated 6 months ago
- Catch IPv6 NS on WAN and send it to LAN. (Should) Make OpenWrt IPv6 ndp relay works.☆14Updated 5 months ago
- Academic Papers about LLM Application on Security☆201Updated 5 months ago
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆20Updated 9 months ago
- ☆27Updated 10 months ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆32Updated last year
- ☆37Updated last year
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆110Updated last year
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆48Updated 11 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆53Updated 8 months ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆16Updated 8 months ago
- enchmarking Large Language Models' Resistance to Malicious Code☆13Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆50Updated 6 months ago
- Source code for LLMxCPG paper☆87Updated 2 months ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆49Updated last month
- ☆26Updated last year
- ☆17Updated last year
- ☆37Updated 6 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆89Updated 10 months ago
- ☆52Updated last year
- ☆13Updated 9 months ago
- Code for "When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search" (NeurIPS 2024)☆16Updated last year
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆16Updated 2 months ago
- ☆16Updated 2 years ago
- ☆113Updated 10 months ago
- [ICSE 2025] The Seeds of the FUTURE Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries (AC…☆19Updated 3 months ago
- Deploy and customize our own pwn.college - pwn.hust.college☆56Updated 2 months ago