RenatoGeh / advtokLinks
Adversarial Tokenization
☆34Updated 3 weeks ago
Alternatives and similar repositories for advtok
Users that are interested in advtok are comparing it to the libraries listed below
Sorting:
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆92Updated last year
- General research for Dreadnode☆27Updated last year
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆43Updated 9 months ago
- ☆98Updated 4 months ago
- ☆108Updated last week
- Tree of Attacks (TAP) Jailbreaking Implementation☆116Updated last year
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆150Updated 11 months ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆20Updated last year
- Attack to induce LLMs within hallucinations☆163Updated last year
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆173Updated 11 months ago
- ☆97Updated last year
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Updated last year
- using ML models for red teaming☆44Updated 2 years ago
- ☆66Updated 2 weeks ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆29Updated last month
- Awesome Jailbreak, red teaming arxiv papers (Automatically Update Every 12th hours)☆80Updated this week
- A compact toolbox for backdoor attacks and defenses.☆186Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 7 months ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 6 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆102Updated last year
- ☆95Updated 2 years ago
- [ArXiv 2025] Denial-of-Service Poisoning Attacks on Large Language Models☆23Updated last year
- Papers about red teaming LLMs and Multimodal models.☆158Updated 6 months ago
- WMDP is a LLM proxy benchmark for hazardous knowledge in bio, cyber, and chemical security. We also release code for RMU, an unlearning m…☆156Updated 6 months ago
- ☆18Updated last year
- Example agents for the Dreadnode platform☆20Updated 3 weeks ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Updated last year
- A prompt injection game to collect data for robust ML research☆65Updated 10 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago