NickNameInvalid / LLM_CTF
☆64Updated 2 months ago
Alternatives and similar repositories for LLM_CTF:
Users that are interested in LLM_CTF are comparing it to the libraries listed below
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆59Updated last month
- ☆42Updated last month
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆51Updated this week
- https://arxiv.org/abs/2412.02776☆51Updated 3 months ago
- General research for Dreadnode☆20Updated 9 months ago
- XBOW Validation Benchmarks☆76Updated 6 months ago
- A collection of prompt injection mitigation techniques.☆20Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆105Updated last year
- ☆90Updated last month
- ☆30Updated 6 months ago
- ☆16Updated 10 months ago
- using ML models for red teaming☆43Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆33Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆55Updated last month
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆23Updated 10 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆68Updated this week
- ☆41Updated 4 months ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆53Updated 11 months ago
- Data Scientists Go To Jupyter☆62Updated 3 weeks ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆91Updated 3 months ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆67Updated last week
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆19Updated 3 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 4 months ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆108Updated last year
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated last month
- Payloads for Attacking Large Language Models☆77Updated 8 months ago
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.☆26Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆67Updated last month
- Codebase of https://arxiv.org/abs/2410.14923☆44Updated 5 months ago
- LLM | Security | Operations in one github repo with good links and pictures.☆24Updated 3 months ago