ScottLogic / prompt-injection
Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external tools.
☆17Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for prompt-injection
- An interactive CLI application for interacting with authenticated Jupyter instances.☆47Updated 8 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆56Updated last month
- Data Scientists Go To Jupyter☆57Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 3 months ago
- LLM Testing Findings Templates☆65Updated 9 months ago
- ☆74Updated last week
- LLM | Security | Operations in one github repo with good links and pictures.☆19Updated last month
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆71Updated 9 months ago
- using ML models for red teaming☆39Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆43Updated this week
- ☆24Updated 2 weeks ago
- ☆58Updated last year
- ☆14Updated last year
- A LLM explicitly designed for getting hacked☆131Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆46Updated last year
- ☆17Updated 2 years ago
- Enumerate AWS permissions and resources.☆64Updated 2 years ago
- Payloads for Attacking Large Language Models☆64Updated 4 months ago
- Security and compliance proxy for LLM APIs☆45Updated last year
- ☆20Updated 2 months ago
- ☆38Updated 5 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- source code for the offsecml framework☆35Updated 5 months ago
- A guide to LLM hacking: fundamentals, prompt injection, offense, and defense☆121Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated 2 months ago
- WAF bypass PoC☆43Updated last year
- ☆110Updated last year