TrustAI-laboratory / ASCII-Smuggling-Hidden-Prompt-Injection-Demo
ASCII Smuggling Hidden Prompt Injection is a novel approach to hacking AI assistants using Unicode Tags. This project demostrate how to use Unicode Tags to hide prompt injection instruction to bypass security measures and inject prompts into large language models, such as GPT-4, leading them to provide unintended or harmful responses.
☆10Updated 7 months ago
Alternatives and similar repositories for ASCII-Smuggling-Hidden-Prompt-Injection-Demo:
Users that are interested in ASCII-Smuggling-Hidden-Prompt-Injection-Demo are comparing it to the libraries listed below
- De-redacting Elon's Email with Character-count Constrained Llama2 Decoding☆10Updated last year
- ☆17Updated last year
- Datasette enrichment for analyzing row data using OpenAI's GPT models☆19Updated 10 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, O…☆5Updated 2 years ago
- Code scanner to check for issues in prompts and LLM calls☆22Updated last week
- CLI and API server for https://github.com/dreadnode/robopages☆32Updated last week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last year
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆9Updated last year
- An AI-powered application that conducts structured interviews to create and maintain detailed personal profiles across various life aspec…☆18Updated last week
- Prompt Engineering Tool for AI Models with cli prompt or api usage☆1Updated last year
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆26Updated 6 months ago
- Open YARA scan- and search engine☆22Updated last month
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆67Updated last month
- An example vulnerable app that integrates an LLM☆16Updated 11 months ago
- A security-first linter for code that shouldn't need linting☆16Updated last year
- ☆24Updated 2 months ago
- Do you want to learn AI Security but don't know where to start ? Take a look at this map.☆22Updated 11 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆48Updated last month
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated last month
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆19Updated 3 months ago
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated last month
- Codebase of https://arxiv.org/abs/2410.14923☆44Updated 5 months ago
- A curated list of GPT agents for cybersecurity☆8Updated 6 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- A collection of prompt injection mitigation techniques.☆20Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 7 months ago