ScottLogic / prompt-injectionLinks
Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external tools.
☆32Updated last year
Alternatives and similar repositories for prompt-injection
Users that are interested in prompt-injection are comparing it to the libraries listed below
Sorting:
- source code for the offsecml framework☆43Updated last year
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆49Updated 2 years ago
- ☆100Updated last month
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- Payloads for AI Red Teaming and beyond☆302Updated 2 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆79Updated 6 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆145Updated 11 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated last week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆165Updated 2 years ago
- LLM Testing Findings Templates☆75Updated last year
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- ☆63Updated last week
- A LLM explicitly designed for getting hacked☆163Updated 2 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆64Updated 6 months ago
- ☆81Updated this week
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 11 months ago
- Payloads for Attacking Large Language Models☆104Updated 5 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- ☆107Updated this week
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- ☆116Updated 2 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆43Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 6 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆149Updated this week
- A security system to protect your vibecoded apps☆169Updated 2 weeks ago
- ☆39Updated last week
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆67Updated 7 months ago
- Cloud subdomains identification tool☆61Updated 7 months ago