NetsecExplained / Attacking-and-Defending-Generative-AILinks
Reference notes for Attacking and Defending Generative AI presentation
☆64Updated 11 months ago
Alternatives and similar repositories for Attacking-and-Defending-Generative-AI
Users that are interested in Attacking-and-Defending-Generative-AI are comparing it to the libraries listed below
Sorting:
- ☆54Updated last week
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆61Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆31Updated 4 months ago
- source code for the offsecml framework☆41Updated last year
- LLM Testing Findings Templates☆72Updated last year
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆55Updated 4 months ago
- NOVA: The Prompt Pattern Matching☆128Updated 2 months ago
- ☆40Updated this week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆122Updated 6 months ago
- ☆41Updated 7 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated last year
- ☆37Updated 6 months ago
- A research project to add some brrrrrr to Burp☆181Updated 5 months ago
- ☆274Updated 2 weeks ago
- ☆17Updated 3 months ago
- Payloads for Attacking Large Language Models☆91Updated last month
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆35Updated 3 weeks ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆54Updated 4 months ago
- Verizon Burp Extensions: AI Suite☆131Updated 2 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- The Arcanum Prompt Injection Taxonomy☆126Updated 2 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆237Updated 2 months ago
- Autonomous AI C2☆31Updated 11 months ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆48Updated last year
- A LLM explicitly designed for getting hacked☆152Updated last year
- ☆111Updated 2 years ago
- A fun POC that is built to understand AI security agents.☆31Updated 6 months ago
- One Conference 2024☆111Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆111Updated last year