ScottLogic / prompt-injection
Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external tools.
☆21Updated 4 months ago
Alternatives and similar repositories for prompt-injection:
Users that are interested in prompt-injection are comparing it to the libraries listed below
- Payloads for Attacking Large Language Models☆75Updated 7 months ago
- source code for the offsecml framework☆37Updated 8 months ago
- Determine privileges from cloud credentials via brute-force testing.☆66Updated 6 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆71Updated last year
- LLM Testing Findings Templates☆66Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 6 months ago
- Data Scientists Go To Jupyter☆62Updated 3 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- ☆36Updated 2 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 5 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆59Updated 2 weeks ago
- using ML models for red teaming☆42Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 8 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆159Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 3 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- ☆33Updated 2 months ago
- ☆42Updated 8 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- A fun POC that is built to understand AI security agents.☆25Updated 2 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆147Updated last month
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 5 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- A LLM explicitly designed for getting hacked☆139Updated last year
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆108Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆106Updated 4 months ago