PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents
☆26Mar 26, 2025Updated 11 months ago
Alternatives and similar repositories for pfi
Users that are interested in pfi are comparing it to the libraries listed below
Sorting:
- ☆27Oct 15, 2025Updated 4 months ago
- ☆14Mar 9, 2025Updated 11 months ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- [VLM-Attack-Survey-2024] Paper list and projects for VLM attacks☆15Feb 12, 2025Updated last year
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆14May 11, 2021Updated 4 years ago
- TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution (IEEE S&P 2025)☆85Nov 25, 2024Updated last year
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆105Jan 31, 2025Updated last year
- ☆118Jul 2, 2024Updated last year
- ☆32Apr 2, 2024Updated last year
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- ☆34Nov 7, 2022Updated 3 years ago
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆39Feb 14, 2026Updated 2 weeks ago
- ☆41Feb 26, 2023Updated 3 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- ☆12Oct 29, 2023Updated 2 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 5 months ago
- A curated list of 150+ papers and resources on Agentic Security. Based on the survey covering the transition from passive LLMs to autonom…☆28Dec 6, 2025Updated 2 months ago
- ☆24Jul 27, 2024Updated last year
- [EMNLP 2024 Findings] Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong Information☆13Oct 1, 2024Updated last year
- Amarisoft LTE - 4G Selective Jammer Core☆13Nov 24, 2019Updated 6 years ago
- ☆18Oct 1, 2025Updated 5 months ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- Proof of concept code for VoteAgain paper☆10Jul 23, 2023Updated 2 years ago
- Smart contracts for a home rental network with IoT doorlocks☆11Jun 5, 2018Updated 7 years ago
- ☆10Sep 4, 2020Updated 5 years ago
- ☆14Mar 10, 2025Updated 11 months ago
- ☆14Nov 11, 2025Updated 3 months ago
- ESP8266 ROM Bootloader utility☆11Oct 18, 2017Updated 8 years ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆13Dec 16, 2024Updated last year
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- A Python-based security assessment tool for continuous automated security scanning and monitoring of domains.☆13Apr 4, 2025Updated 10 months ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- ☆11Dec 3, 2014Updated 11 years ago
- Camouflage YOLO - (CAMOLO) trains adversarial patches to confuse the YOLO family of object detectors.☆12Oct 20, 2022Updated 3 years ago
- !exploitable Crash Analyzer - MSEC Debugger Extensions☆11Feb 16, 2021Updated 5 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆39Updated this week