davidwillisowen / IPIMLinks
Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injection vulnerabilities in LLMs and produce POCs.
☆16Updated 6 months ago
Alternatives and similar repositories for IPIM
Users that are interested in IPIM are comparing it to the libraries listed below
Sorting:
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆157Updated last year
- All things specific to LLM Red Teaming Generative AI☆29Updated last year
- source code for the offsecml framework☆44Updated last year
- ☆83Updated last week
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated 2 years ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 11 months ago
- ☆139Updated last week
- Reference notes for Attacking and Defending Generative AI presentation☆69Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84Updated 9 months ago
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆32Updated last year
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Updated last year
- Arxiv + Notion Sync☆20Updated 8 months ago
- using ML models for red teaming☆45Updated 2 years ago
- ☆44Updated last year
- ☆18Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated this week
- Integrate PyRIT in existing tools☆47Updated 11 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆26Updated 7 months ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆37Updated this week
- https://arxiv.org/abs/2412.02776☆67Updated last year
- ☆92Updated this week
- Data Scientists Go To Jupyter☆68Updated 11 months ago
- Manual Prompt Injection / Red Teaming Tool☆52Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 4 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Updated last month
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Updated 7 months ago
- ☆22Updated last year
- Example agents for the Dreadnode platform☆22Updated last month
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆84Updated 3 weeks ago