ScottLogic / prompt-injectionLinks
Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external tools.
☆32Updated 11 months ago
Alternatives and similar repositories for prompt-injection
Users that are interested in prompt-injection are comparing it to the libraries listed below
Sorting:
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆165Updated last year
- Payloads for AI Red Teaming and beyond☆286Updated last month
- Verizon Burp Extensions: AI Suite☆138Updated 5 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆140Updated 9 months ago
- Payloads for Attacking Large Language Models☆101Updated 4 months ago
- A research project to add some brrrrrr to Burp☆191Updated 7 months ago
- source code for the offsecml framework☆41Updated last year
- ☆99Updated this week
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆48Updated 2 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆63Updated 5 months ago
- LLM Testing Findings Templates☆73Updated last year
- using ML models for red teaming☆44Updated 2 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated 3 weeks ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆79Updated last week
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated last year
- ☆71Updated last month
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆77Updated 5 months ago
- ☆58Updated this week
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆96Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆60Updated 6 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 5 months ago
- ☆116Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- ☆38Updated 2 weeks ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 8 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆16Updated 6 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆44Updated 3 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year