dreadnode / AIRTBench-CodeLinks
Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models
☆76Updated last week
Alternatives and similar repositories for AIRTBench-Code
Users that are interested in AIRTBench-Code are comparing it to the libraries listed below
Sorting:
- ☆66Updated last week
- source code for the offsecml framework☆41Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆133Updated 8 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆43Updated 2 months ago
- ☆17Updated 5 months ago
- ☆53Updated this week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 2 weeks ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 6 months ago
- ☆42Updated 9 months ago
- NOVA: The Prompt Pattern Matching☆168Updated last month
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 4 months ago
- ☆18Updated 8 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 6 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆65Updated last year
- LLM Testing Findings Templates☆72Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- ☆71Updated last month
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 6 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆99Updated 2 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 2 weeks ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆117Updated 11 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆119Updated last month
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated last week
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆26Updated 2 months ago
- ☆164Updated this week
- Examine Chrome extensions for security issues☆85Updated last month