RenatoGeh / advtokLinks
Adversarial Tokenization
☆28Updated 2 weeks ago
Alternatives and similar repositories for advtok
Users that are interested in advtok are comparing it to the libraries listed below
Sorting:
- General research for Dreadnode☆25Updated last year
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated 6 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆91Updated last year
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Updated 9 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆133Updated 8 months ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆13Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- ☆17Updated last year
- ☆86Updated 9 months ago
- Nemesis agent for Mythic☆27Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- A simple to use single-include Windows API resolver☆23Updated last year
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆17Updated last year
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago
- Mythic C2 Profile that allows agents to communicate over GitHub☆15Updated 7 months ago
- single-threaded event driven sleep obfuscation poc for linux☆35Updated 2 months ago
- Minimal workflows☆20Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year
- ☆18Updated last year
- A collection of sample code used in some experiments with Sliver C2☆14Updated 2 years ago
- ☆53Updated 3 weeks ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- Simple reverse ICMP shell☆14Updated last year
- ☆17Updated 7 months ago
- Putting the C2 in C2loudflare☆16Updated last year
- Entra ID Password Protection Banned Password Lists☆16Updated last year
- A service container for interacting with SRA's VECTR☆11Updated 4 months ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆37Updated last month
- Example agents for the Dreadnode platform☆16Updated last month
- string encryption in Nim☆20Updated last year