LMAP (large language model mapper) is like NMAP for LLM, is an LLM Vulnerability Scanner and Zero-day Vulnerability Fuzzer.
β29Oct 16, 2024Updated last year
Alternatives and similar repositories for LMAP
Users that are interested in LMAP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π€π‘οΈπππ Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.β26May 16, 2024Updated last year
- An awesome and comprehensive list of LLM Securtiy Startups.β15Nov 9, 2024Updated last year
- LLM security and privacyβ54Oct 15, 2024Updated last year
- ASCII Smuggling Hidden Prompt Injection is a novel approach to hacking AI assistants using Unicode Tags. This project demostrate how to uβ¦β18Aug 7, 2024Updated last year
- Research on "Many-Shot Jailbreaking" in Large Language Models (LLMs). It unveils a novel technique capable of bypassing the safety mechanβ¦β16Aug 6, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- KloudTrader's in-house library designed for rapid prototyping and development of trading strategies. πππβ18Jan 12, 2021Updated 5 years ago
- Trophy list of zero-day vulnerabilities that I discoveredβ13May 6, 2024Updated 2 years ago
- AI Red Teaming Rangeβ127Mar 13, 2025Updated last year
- Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. Itβs a high-severity vulnerabiliβ¦β12May 14, 2023Updated 2 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )β12Feb 21, 2023Updated 3 years ago
- A prompt defence is a multi-layer defence that can be used to protect your applications against prompt injection attacks.β22Apr 8, 2026Updated last month
- β29May 14, 2019Updated 6 years ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interactionβ17Nov 9, 2024Updated last year
- β12Mar 31, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectioβ¦β21Jul 28, 2025Updated 9 months ago
- A collection of tools for managing and automating vulnerability management.β13Mar 24, 2022Updated 4 years ago
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.β39May 5, 2025Updated last year
- Open-source, enterprise-grade threat modeling platformβ75May 1, 2026Updated last week
- A curated collection of the latest academic research papers and developments in AI Security. This repository aims to provide a comprehensβ¦β20Mar 23, 2024Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platformβ10Jun 28, 2020Updated 5 years ago
- β79Dec 19, 2024Updated last year
- iOS traffic interception framework which route all device HTTP/HTTPS traffic through Burp Suite via a system-wide VPN tunnelβ43Feb 15, 2026Updated 2 months ago
- Playing around with various jailbreaking techniques ahead of the Gray Swan AI Ultimate Jailbreaking Competitionβ18Oct 6, 2024Updated last year
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Seecurity helper tool to detect entry points of WordPress pluginsβ10May 16, 2024Updated last year
- Simple recon tool automates your recon processβ16Apr 15, 2023Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instancesβ23Aug 6, 2023Updated 2 years ago
- This service aims to scan the network with WMI, list the packages of the found machines, and get a report of these packages.β14Mar 7, 2024Updated 2 years ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someoneβ13Dec 14, 2023Updated 2 years ago
- Obtain GraphQL API schema despite disabled introspection!β68Mar 11, 2026Updated last month
- Simple XSS vulnerability checker tool very useful with xsschecker.β27Nov 21, 2025Updated 5 months ago
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploitsβ37Feb 16, 2026Updated 2 months ago
- β10Mar 13, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- β39Jul 1, 2025Updated 10 months ago
- A series of PowerShell scripts to automate the assessment of Azure IaaS securityβ22Feb 18, 2026Updated 2 months ago
- One Click Roop DeepFake using Google Colabβ25Aug 7, 2023Updated 2 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backendβ12Jan 3, 2023Updated 3 years ago
- Implementation of joint bayesian model, written in python.β11Aug 2, 2021Updated 4 years ago
- β13Mar 19, 2023Updated 3 years ago
- Code implementation for paper AbsenceBench: Language Models Can't Tell What's Missingβ19Oct 23, 2025Updated 6 months ago