NetSPI / Open-LLM-Security-BenchmarkLinks
☆14Updated 6 months ago
Alternatives and similar repositories for Open-LLM-Security-Benchmark
Users that are interested in Open-LLM-Security-Benchmark are comparing it to the libraries listed below
Sorting:
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆31Updated this week
- ☆17Updated 2 months ago
- ☆37Updated this week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last month
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆38Updated last week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆73Updated last month
- source code for the offsecml framework☆40Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- ☆16Updated last year
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 3 months ago
- https://arxiv.org/abs/2412.02776☆57Updated 6 months ago
- Autonomous AI C2☆31Updated 11 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 2 months ago
- ☆51Updated last week
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆40Updated 2 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆120Updated 6 months ago
- using ML models for red teaming☆43Updated last year
- ☆79Updated last month
- A fun POC that is built to understand AI security agents.☆31Updated 6 months ago
- Minimal workflows☆19Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 3 months ago
- Verizon Burp Extensions: AI Suite☆131Updated 2 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated last month
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- Automated vulnerability discovery and annotation☆67Updated 11 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆63Updated 10 months ago
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆53Updated 2 months ago
- An example vulnerable app that integrates an LLM☆21Updated last year
- A simple POC to expose Mythic as a MCP server☆62Updated 3 months ago