ScottLogic / prompt-injectionLinks
Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external tools.
☆32Updated last year
Alternatives and similar repositories for prompt-injection
Users that are interested in prompt-injection are comparing it to the libraries listed below
Sorting:
- LLM Testing Findings Templates☆75Updated last year
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- ☆124Updated 2 weeks ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆167Updated 2 years ago
- ☆215Updated last week
- source code for the offsecml framework☆46Updated last year
- A LLM explicitly designed for getting hacked☆165Updated 2 years ago
- ☆101Updated last month
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆52Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆54Updated 7 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 8 months ago
- Payloads for Attacking Large Language Models☆114Updated 6 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- ☆82Updated last month
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆152Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆91Updated last week
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆40Updated 3 months ago
- An AWS IAM Privilege Escalation Path Library☆67Updated 2 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated last month
- Hijack a slack bot to phish your way in☆57Updated 5 months ago
- ☆41Updated this week
- ☆82Updated 4 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 3 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- using ML models for red teaming☆45Updated 2 years ago
- Payloads for AI Red Teaming and beyond☆314Updated 4 months ago