dreadnode / AIRTBench-CodeLinks
Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models
☆83Updated this week
Alternatives and similar repositories for AIRTBench-Code
Users that are interested in AIRTBench-Code are comparing it to the libraries listed below
Sorting:
- source code for the offsecml framework☆42Updated last year
- ☆58Updated 2 weeks ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆142Updated 10 months ago
- ☆85Updated last week
- ☆20Updated 10 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 5 months ago
- NOVA: The Prompt Pattern Matching☆22Updated 3 weeks ago
- ☆17Updated 6 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 7 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆46Updated 4 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆94Updated last week
- ☆73Updated 2 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 5 months ago
- LLM Testing Findings Templates☆74Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆87Updated last week
- ☆43Updated 10 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆57Updated last month
- ☆320Updated last month
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 7 months ago
- ☆35Updated this week
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆125Updated 3 weeks ago
- Data Scientists Go To Jupyter☆67Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 7 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆122Updated last month
- Create honeypots for cloud environments☆71Updated 2 weeks ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Verizon Burp Extensions: AI Suite☆139Updated 6 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 4 months ago