Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injection vulnerabilities in LLMs and produce POCs.
☆18Jul 28, 2025Updated 7 months ago
Alternatives and similar repositories for IPIM
Users that are interested in IPIM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- [ICML'25] MELON: Provable Defense Against Indirect Prompt Injection Attacks in AI Agents☆24Jul 31, 2025Updated 7 months ago
- Repository for OUSPG LLM Hackathon.☆12Aug 13, 2025Updated 7 months ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Code to accompany my “Creating Android applications with Clojure” series of posts☆22Feb 22, 2011Updated 15 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Yet another resource for collecting articles, videos etc. regarding functional programming☆15Sep 21, 2016Updated 9 years ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Nov 9, 2024Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- Deformable DETR in Pytorch Lightning☆12Sep 15, 2021Updated 4 years ago
- An AI-powered search engine to interact with documentation using RAG and local LLMs. Privately deployable with vector search and a modern…☆12Sep 2, 2025Updated 6 months ago
- AI-powered agent that scrapes leads with Bright Data, qualifies them using OpenAI, and delivers outreach-ready results via an easy Stream…☆32Sep 28, 2025Updated 5 months ago
- Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Inclu…☆24Dec 26, 2025Updated 2 months ago
- Various video readers for PyTorch models training and a benchmark☆12Updated this week
- This module generates JSON Web Tokens in PowerShell.☆17Dec 11, 2023Updated 2 years ago
- Code for our NAACL2025 accepted paper: Attention Tracker: Detecting Prompt Injection Attacks in LLMs☆23Sep 19, 2025Updated 6 months ago
- A C2 Framework developed as an FYP☆12Feb 15, 2026Updated last month
- An awesome and comprehensive list of LLM Securtiy Startups.☆15Nov 9, 2024Updated last year
- Linux kernel integrity monitor for detecting syscall hooking☆80Feb 16, 2026Updated last month
- Manual Prompt Injection / Red Teaming Tool☆55Updated this week
- PoC for CVE-2023-20126☆24Jun 20, 2023Updated 2 years ago
- Playing around with various jailbreaking techniques ahead of the Gray Swan AI Ultimate Jailbreaking Competition☆18Oct 6, 2024Updated last year
- ☆19Sep 8, 2023Updated 2 years ago
- Security tools for purple team, AI security, and M365/GWS. Authorized use only.☆71Mar 10, 2026Updated 2 weeks ago
- A class project I used to explore full stack web development in OCaml.☆33Jul 17, 2022Updated 3 years ago
- All things specific to LLM Red Teaming Generative AI☆30Oct 22, 2024Updated last year
- ☆23Jul 1, 2017Updated 8 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- An AI-powered B2B lead generation system. Private preview available☆28Jan 22, 2026Updated 2 months ago
- ATLAS tactics, techniques, and case studies data☆118Feb 6, 2026Updated last month
- Complete frontend cheat sheet ( html css javascript )☆26Dec 20, 2023Updated 2 years ago
- This repository provides a benchmark for prompt injection attacks and defenses in LLMs☆413Oct 29, 2025Updated 4 months ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits☆35Feb 16, 2026Updated last month
- LMAP (large language model mapper) is like NMAP for LLM, is an LLM Vulnerability Scanner and Zero-day Vulnerability Fuzzer.☆29Oct 16, 2024Updated last year
- NeMo -> Riva Conversion Tool☆21Nov 17, 2025Updated 4 months ago
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- 🌙 ZetaLib - The only AI Library you need☆319Mar 9, 2026Updated 2 weeks ago
- This is the implementation code for the paper, "An Attention-guided Multistream Feature Fusion Network for Early Localization of Risky Tr…☆24Nov 1, 2023Updated 2 years ago