ReversecLabs / spikeeLinks
☆127Updated last week
Alternatives and similar repositories for spikee
Users that are interested in spikee are comparing it to the libraries listed below
Sorting:
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆152Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated last week
- A research project to add some brrrrrr to Burp☆196Updated 11 months ago
- An automated security testing platform that uses Large Language Models (LLMs) to autonomously solve CTF challenges and penetration testin…☆190Updated this week
- source code for the offsecml framework☆44Updated last year
- Payloads for AI Red Teaming and beyond☆315Updated 4 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 8 months ago
- ☆72Updated last month
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆262Updated 3 months ago
- Integrate PyRIT in existing tools☆44Updated 10 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- ☆233Updated 3 weeks ago
- A LLM explicitly designed for getting hacked☆164Updated 2 years ago
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated last year
- ☆355Updated 3 months ago
- Payloads for Attacking Large Language Models☆116Updated 7 months ago
- NOVA: The Prompt Pattern Matching☆63Updated 2 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆136Updated 3 weeks ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated last month
- ☆21Updated last year
- Proximity is a MCP security scanner powered with NOVA☆269Updated 3 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆108Updated 7 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 8 months ago
- LLM Testing Findings Templates☆75Updated last year
- ☆44Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆167Updated 2 years ago
- Agentic AI tool for offensive security and pentesting☆43Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆108Updated 2 years ago