ReversecLabs / spikeeLinks
☆85Updated last week
Alternatives and similar repositories for spikee
Users that are interested in spikee are comparing it to the libraries listed below
Sorting:
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆142Updated 10 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆83Updated this week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 5 months ago
- A research project to add some brrrrrr to Burp☆194Updated 8 months ago
- AI agent for autonomous cyber operations☆274Updated last week
- ☆58Updated 2 weeks ago
- ☆20Updated 10 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- source code for the offsecml framework☆42Updated last year
- Payloads for AI Red Teaming and beyond☆293Updated last month
- NOVA: The Prompt Pattern Matching☆22Updated 3 weeks ago
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- Integrate PyRIT in existing tools☆37Updated 7 months ago
- ☆43Updated 10 months ago
- ☆320Updated last month
- Verizon Burp Extensions: AI Suite☆139Updated 6 months ago
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆253Updated last month
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆126Updated 3 weeks ago
- Curated list of Open Source project focused on LLM security☆62Updated 11 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆94Updated last week
- ☆73Updated 2 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆135Updated last week
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆304Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 5 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆57Updated last month
- LLM Testing Findings Templates☆74Updated last year
- ☆267Updated last month
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 7 months ago