ReversecLabs / spikeeLinks
☆100Updated 2 weeks ago
Alternatives and similar repositories for spikee
Users that are interested in spikee are comparing it to the libraries listed below
Sorting:
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆143Updated 10 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆88Updated last week
- source code for the offsecml framework☆42Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆79Updated 6 months ago
- ☆62Updated last week
- Payloads for AI Red Teaming and beyond☆302Updated 2 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- AI agent for autonomous cyber operations☆354Updated this week
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- Payloads for Attacking Large Language Models☆104Updated 5 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆144Updated this week
- NOVA: The Prompt Pattern Matching☆42Updated 3 weeks ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- A security system to protect your vibecoded apps☆62Updated 2 weeks ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆126Updated last month
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆257Updated last month
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 6 months ago
- Integrate PyRIT in existing tools☆39Updated 8 months ago
- ☆324Updated last month
- A LLM explicitly designed for getting hacked☆163Updated 2 years ago
- LLM Testing Findings Templates☆75Updated last year
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆73Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆58Updated 2 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆97Updated last month
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆165Updated 2 years ago
- Curated list of Open Source project focused on LLM security☆64Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆103Updated 2 years ago
- Data Scientists Go To Jupyter☆67Updated 8 months ago
- Dropbox LLM Security research code and results☆241Updated last year