NetSPI / Open-LLM-Security-BenchmarkLinks
☆21Updated last year
Alternatives and similar repositories for Open-LLM-Security-Benchmark
Users that are interested in Open-LLM-Security-Benchmark are comparing it to the libraries listed below
Sorting:
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆91Updated this week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆152Updated last year
- ☆123Updated last week
- ☆70Updated 2 weeks ago
- Integrate PyRIT in existing tools☆43Updated 9 months ago
- ☆19Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆116Updated last year
- source code for the offsecml framework☆46Updated last year
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆131Updated 2 months ago
- LLM Testing Findings Templates☆75Updated last year
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 9 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 7 months ago
- ☆44Updated last year
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- ☆215Updated this week
- All things specific to LLM Red Teaming Generative AI☆29Updated last year
- Payloads for AI Red Teaming and beyond☆311Updated 3 months ago
- Payloads for Attacking Large Language Models☆114Updated 6 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆187Updated last week
- ☆18Updated last year
- A LLM explicitly designed for getting hacked☆165Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 6 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆210Updated 2 weeks ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated last month
- Data Scientists Go To Jupyter☆68Updated 9 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- Benchmarking LLM agents on Cyber Threat Investigation.☆108Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 9 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago