alexdevassy / Machine_Learning_CTF_ChallengesLinks
CTF challenges designed and implemented in machine learning applications
☆162Updated 11 months ago
Alternatives and similar repositories for Machine_Learning_CTF_Challenges
Users that are interested in Machine_Learning_CTF_Challenges are comparing it to the libraries listed below
Sorting:
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆103Updated last year
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆293Updated 11 months ago
- A LLM explicitly designed for getting hacked☆155Updated 2 years ago
- Payloads for Attacking Large Language Models☆92Updated 2 months ago
- ☆305Updated last month
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆303Updated last year
- A collection of awesome resources related AI security☆271Updated last week
- A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.☆340Updated this week
- XBOW Validation Benchmarks☆200Updated last month
- Official writeups for Business CTF 2024: The Vault Of Hope☆150Updated 8 months ago
- ☆63Updated 2 months ago
- All things specific to LLM Red Teaming Generative AI☆28Updated 9 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆242Updated 3 months ago
- Prompt Injection Primer for Engineers☆449Updated last year
- Automated web vulnerability scanning with LLM agents☆341Updated last month
- Writeups for various CTFs competitions☆101Updated last year
- A curated list of large language model tools for cybersecurity research.☆468Updated last year
- Learn about a type of vulnerability that specifically targets machine learning models☆314Updated last year
- Files + Solutions for DownUnderCTF 2024 Challenges☆113Updated last year
- ☆139Updated 2 months ago
- Prompt Injections Everywhere☆139Updated last year
- Dropbox LLM Security research code and results☆231Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆147Updated last year
- A research project to add some brrrrrr to Burp☆181Updated 5 months ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Updated last year
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆366Updated 2 years ago
- CVEs and Techniques used PDF as an attack vector.☆93Updated 3 years ago
- A very simple open source implementation of Google's Project Naptime☆161Updated 4 months ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆86Updated 3 months ago