LMAP (large language model mapper) is like NMAP for LLM, is an LLM Vulnerability Scanner and Zero-day Vulnerability Fuzzer.
☆28Oct 16, 2024Updated last year
Alternatives and similar repositories for LMAP
Users that are interested in LMAP are comparing it to the libraries listed below
Sorting:
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆26May 16, 2024Updated last year
- All things specific to LLM Red Teaming Generative AI☆29Oct 22, 2024Updated last year
- LLM security and privacy☆53Oct 15, 2024Updated last year
- ☆29May 14, 2019Updated 6 years ago
- Java implementation of the EbMS 2.0 specification.☆10Feb 20, 2026Updated 2 weeks ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- A list of all projects by UW CSE students.☆11Feb 8, 2016Updated 10 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated 2 weeks ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- ☆11Jun 7, 2025Updated 8 months ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Scripts to automatically sync Claude Code generated TODO to TaskWarrior☆17Jun 22, 2025Updated 8 months ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- This is the code of our work CISS Certified Robustness Against Natural Language Attacks by Causal Intervention published on ICML 2022☆11Dec 6, 2022Updated 3 years ago
- Yara sort☆13Updated this week
- A powerful prompt template engine built upon Jinja☆12Oct 22, 2025Updated 4 months ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- Publicly accessible version of the FiGHT website.☆17Nov 14, 2025Updated 3 months ago
- ☆11Mar 13, 2023Updated 2 years ago
- **A powerful, offline, single-file HTML tool designed for developers and security researchers to inspect and analyze JavaScript Source Ma…☆90Oct 24, 2025Updated 4 months ago
- ☆12Jan 24, 2025Updated last year
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- Developer focused AI Gateway☆15Mar 7, 2025Updated 11 months ago
- ☆10Aug 9, 2024Updated last year
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- Heterogeneous Model Reuse via Optimizing Multiparty Multiclass Margin☆11Jan 15, 2020Updated 6 years ago
- 1-step Q Learning from the paper "Asynchronous Methods for Deep Reinforcement Learning"☆12Mar 13, 2017Updated 8 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Generic library shared between several projects.☆14Feb 23, 2026Updated last week
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- Researching the forward-backward algorithm☆11Aug 3, 2018Updated 7 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago