RenatoGeh / advtok
Adversarial Tokenization
☆22Updated 2 weeks ago
Alternatives and similar repositories for advtok
Users that are interested in advtok are comparing it to the libraries listed below
Sorting:
- General research for Dreadnode☆21Updated 10 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated 2 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆86Updated 11 months ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆13Updated 6 months ago
- ☆61Updated 5 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆21Updated 2 years ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆16Updated 10 months ago
- ☆34Updated 7 months ago
- ☆86Updated last year
- [ArXiv 2024] Denial-of-Service Poisoning Attacks on Large Language Models☆18Updated 6 months ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆11Updated 5 months ago
- SSDP Service Discovery☆17Updated 6 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated 2 years ago
- ☆62Updated 10 months ago
- Strategy for building a Red Team☆17Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- Minimal workflows☆19Updated last year
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Decrypt encrypted SonicOSX firmware images☆14Updated 2 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Nemesis agent for Mythic☆27Updated 8 months ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆20Updated 4 years ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated 2 months ago
- ☆11Updated 3 years ago
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆50Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆107Updated last year
- ☆15Updated last year
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆13Updated 9 months ago
- ☆44Updated 2 years ago