LazaUK / DeepLearningAI-Giskard-RedTeaming
Practical Jupyter notebooks from Andrew Ng and Giskard team's "Red Teaming LLM Applications" course on DeepLearning.AI.
☆15Updated 9 months ago
Alternatives and similar repositories for DeepLearningAI-Giskard-RedTeaming:
Users that are interested in DeepLearningAI-Giskard-RedTeaming are comparing it to the libraries listed below
- Rapidly identify and mitigate container security vulnerabilities with generative AI.☆67Updated this week
- An example vulnerable app that integrates an LLM☆15Updated 9 months ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆22Updated last year
- Secure Jupyter Notebooks and Experimentation Environment☆65Updated 2 weeks ago
- My inputs for the LLM Gandalf made by Lakera☆41Updated last year
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆19Updated 8 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 8 months ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆56Updated last year
- A collection of prompt injection mitigation techniques.☆20Updated last year
- ☆55Updated 9 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 5 months ago
- Source Code and Usage Samples for the Resources hosted in the NVIDIA AI Enterprise AzureML Registry☆19Updated 5 months ago
- Practical examples of "Flawed Machine Learning Security" together with ML Security best practice across the end to end stages of the mach…☆105Updated 2 years ago
- ☆12Updated last month
- ☆20Updated 4 months ago
- ☆10Updated last year
- ☆26Updated 2 months ago
- Microsoft AI Value Accelerator☆30Updated 6 months ago
- Agentic Workflows Made Simple☆94Updated this week
- ATLAS tactics, techniques, and case studies data☆54Updated 3 months ago
- ☆25Updated 9 months ago
- using ML models for red teaming☆39Updated last year
- This repository contains resources and materials for the "Using Retrieval Augmented Generation (RAG), Langchain, and LLMs for Cybersecuri…☆25Updated 2 weeks ago
- Generative AI Governance for Enterprises☆14Updated last month
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆20Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 10 months ago
- Payloads for Attacking Large Language Models☆72Updated 6 months ago
- ⚡Simplify and optimize the use of LLMs☆14Updated 8 months ago
- Bundle of security analysis scripts for keras tensorflow models☆12Updated 9 months ago