TrustAI-laboratory / ASCII-Smuggling-Hidden-Prompt-Injection-DemoLinks
ASCII Smuggling Hidden Prompt Injection is a novel approach to hacking AI assistants using Unicode Tags. This project demostrate how to use Unicode Tags to hide prompt injection instruction to bypass security measures and inject prompts into large language models, such as GPT-4, leading them to provide unintended or harmful responses.
☆18Updated last year
Alternatives and similar repositories for ASCII-Smuggling-Hidden-Prompt-Injection-Demo
Users that are interested in ASCII-Smuggling-Hidden-Prompt-Injection-Demo are comparing it to the libraries listed below
Sorting:
- Manual Prompt Injection / Red Teaming Tool☆50Updated last year
- This is a repository to experiment with MCP for security☆45Updated 11 months ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 7 months ago
- ☆19Updated 8 months ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆59Updated 2 years ago
- ☆50Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Codebase of https://arxiv.org/abs/2410.14923☆52Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆80Updated 2 years ago
- BlueSky OSINT Tool☆14Updated last year
- LLM | Security | Operations in one github repo with good links and pictures.☆81Updated this week
- ☆11Updated 2 years ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆30Updated 7 months ago
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆43Updated 2 weeks ago
- a hackbot proof-of-concept☆39Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 11 months ago
- ☆14Updated last year
- An example vulnerable app that integrates an LLM☆25Updated last year
- https://arxiv.org/abs/2412.02776☆67Updated last year
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆23Updated last month
- An interactive CLI application for interacting with authenticated Jupyter instances.☆54Updated 7 months ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆22Updated last month
- This repository contains various attack against Large Language Models.☆122Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆52Updated last year
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆30Updated last year
- A collection of prompt injection mitigation techniques.☆25Updated 2 years ago
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆116Updated last year