davidwillisowen / IPIMLinks
Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injection vulnerabilities in LLMs and produce POCs.
☆14Updated 4 months ago
Alternatives and similar repositories for IPIM
Users that are interested in IPIM are comparing it to the libraries listed below
Sorting:
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆150Updated 11 months ago
- source code for the offsecml framework☆44Updated last year
- All things specific to LLM Red Teaming Generative AI☆29Updated last year
- ☆66Updated 2 weeks ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆90Updated last week
- ☆113Updated this week
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆29Updated last month
- Tree of Attacks (TAP) Jailbreaking Implementation☆116Updated last year
- ☆18Updated 8 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 9 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- ☆21Updated 11 months ago
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆32Updated last year
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆38Updated this week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 7 months ago
- using ML models for red teaming☆44Updated 2 years ago
- ☆18Updated last year
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆50Updated 2 years ago
- [EMNLP 2024] Holistic Automated Red Teaming for Large Language Models through Top-Down Test Case Generation and Multi-turn Interaction☆17Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 3 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆47Updated 5 months ago
- ☆98Updated 4 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆68Updated 8 months ago
- ☆81Updated 3 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆43Updated 9 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆105Updated 2 years ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆42Updated last month
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆35Updated 11 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆190Updated this week
- Data Scientists Go To Jupyter☆68Updated 9 months ago