dreadnode / example-agentsLinks
Example agents for the Dreadnode platform
☆16Updated last month
Alternatives and similar repositories for example-agents
Users that are interested in example-agents are comparing it to the libraries listed below
Sorting:
- ☆17Updated last year
- Minimal workflows☆20Updated last year
- source code for the offsecml framework☆41Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 4 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- ☆53Updated this week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆133Updated 8 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 4 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆76Updated last week
- An example vulnerable app that integrates an LLM☆24Updated last year
- Data Scientists Go To Jupyter☆66Updated 6 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆58Updated 7 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆68Updated last month
- Arxiv + Notion Sync☆20Updated 4 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 2 months ago
- using ML models for red teaming☆44Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- ☆66Updated last week
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Updated 6 months ago
- AI-based implant feature☆25Updated 4 months ago
- Protection against HTML smuggling attacks.☆97Updated 2 months ago
- A simple POC to expose Mythic as a MCP server☆67Updated 5 months ago
- ☆18Updated 8 months ago
- ☆16Updated 2 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆34Updated this week
- MLOps Attack Toolkit☆27Updated 2 weeks ago
- General research for Dreadnode☆25Updated last year
- ☆17Updated 5 months ago
- HTML Smuggling with Web Assembly☆64Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆50Updated 10 months ago