aivillage / llm_verificationLinks
LLM prompt attacks for hacker CTFs via CTFd.
☆12Updated last year
Alternatives and similar repositories for llm_verification
Users that are interested in llm_verification are comparing it to the libraries listed below
Sorting:
- Data Scientists Go To Jupyter☆66Updated 6 months ago
- Small tools to assist with using Large Language Models☆11Updated last year
- https://arxiv.org/abs/2412.02776☆60Updated 9 months ago
- This is a repository to experiment with MCP for security☆43Updated 7 months ago
- Open source library for implementing a contextual firewall for LLM based apps.☆12Updated 4 months ago
- ☆53Updated 3 weeks ago
- using ML models for red teaming☆44Updated 2 years ago
- A very simple open source implementation of Google's Project Naptime☆168Updated 5 months ago
- A collection of prompt injection mitigation techniques.☆24Updated 2 years ago
- ☆14Updated last year
- LLM | Security | Operations in one github repo with good links and pictures.☆52Updated 8 months ago
- ☆30Updated 7 months ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Updated 2 years ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆50Updated 9 months ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆25Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 8 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆76Updated this week
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆60Updated this week
- A python library for building and using hash databases.☆22Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆81Updated 7 months ago
- ATLAS tactics, techniques, and case studies data☆78Updated 3 weeks ago
- A minimal malware analysis sandbox for macOS☆31Updated 2 years ago
- A ruleset to find potentially malicious code in macOS malware samples☆40Updated 2 years ago
- We refined a GPT-3 model on Wattpad user account data to generate targeted password guesses automatically.☆70Updated 2 years ago
- ☆26Updated 2 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆58Updated 7 months ago
- ☆65Updated 7 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 4 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- The missing API for the CISA Known Exploited Vulnerabilities Catalog. This repository contains the source running at kevin.gtfkd.com☆16Updated last month