A system that turns jailbreak papers into runnable attacks and benchmarks — live, as research evolves.
☆26Apr 8, 2026Updated this week
Alternatives and similar repositories for Jailbreak-Foundry
Users that are interested in Jailbreak-Foundry are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MLS-MPM simulation running in Unity☆23Sep 27, 2021Updated 4 years ago
- Security Analytics UoM - COMP90073 - S2 2020☆10Oct 1, 2021Updated 4 years ago
- 用于写NSFC本子的Agent Skills☆78Feb 25, 2026Updated last month
- Ilya Sutskever “If you really learn all of these, you’ll know 90% of what matters today”. This repo records my thoughts on these papers.☆11May 24, 2024Updated last year
- 自制的北邮本科毕设答辩ppt模板☆22Nov 21, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆32Nov 15, 2020Updated 5 years ago
- This repository collects lecture notes on Cryptography that are publicly accessible.☆28Jan 25, 2022Updated 4 years ago
- [ACL 2025 Findings] The official GitHub repo for the paper "Nuclear Deployed: Analyzing Catastrophic Risks in Decision-making of Autonomo…☆20May 20, 2025Updated 10 months ago
- 2021年秋季学期 南京大学ICS课程 Lab实验部分☆19Feb 8, 2023Updated 3 years ago
- ReasoningShield: Safety Detection over Reasoning Traces of Large Reasoning Models☆26Sep 27, 2025Updated 6 months ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Dec 24, 2025Updated 3 months ago
- High Performance Implementation of Secure Multiparty Computation protocols☆30Mar 19, 2026Updated 3 weeks ago
- PRG's Software and Hardware Framework for Quadrotors☆14Mar 24, 2021Updated 5 years ago
- Official PyTorch implementation of our paper "Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World A…☆11Feb 8, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆19Sep 1, 2025Updated 7 months ago
- Lattice Sieving using GPU Tensor cores based on the General Sieve Kernel (G6K)☆44Mar 31, 2025Updated last year
- JEECMS FreeMarker-RCE☆12Nov 12, 2021Updated 4 years ago
- ☆42May 29, 2024Updated last year
- PHP文件上传50+绕过手法全景解析☆17Mar 16, 2025Updated last year
- ☆15Sep 6, 2021Updated 4 years ago
- Toolchain built around the Megatron-LM for Distributed Training☆92Mar 23, 2026Updated 2 weeks ago
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆49Mar 18, 2026Updated 3 weeks ago
- Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)☆16Jun 13, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The official code for ``An Engorgio Prompt Makes Large Language Model Babble on''☆22Aug 9, 2025Updated 8 months ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month
- 代码垃圾的缝合怪扫描器☆20May 28, 2021Updated 4 years ago
- CPIC cases implemented with taichi.☆60Nov 10, 2020Updated 5 years ago
- ☆38Apr 2, 2026Updated last week
- ☆21Jun 13, 2022Updated 3 years ago
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆26Aug 31, 2022Updated 3 years ago
- A Programmer Guide of the P4 Language.☆41Jun 4, 2018Updated 7 years ago
- Confluence后台rce☆20Oct 20, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 编译原理(紫龙书)中文第2版习题答案。Compilers Principles, Techniques, & Toos (purple dragon book) second edition practice answer.☆19Aug 1, 2013Updated 12 years ago
- 《The C++ Standard Library》的非专业个人翻译☆63May 8, 2024Updated last year
- Solving BDD and uSVP with predicate☆51Jul 31, 2024Updated last year
- This software is part of "Supersingular Isogeny Key Encapsulation", a submission to the NIST Post-Quantum Standardization project.☆62Dec 12, 2022Updated 3 years ago
- MySQL Honeypot☆24Feb 13, 2025Updated last year
- ☆21Jun 24, 2022Updated 3 years ago
- ☆56Aug 5, 2024Updated last year