dreadnode / parleyLinks
Tree of Attacks (TAP) Jailbreaking Implementation
☆109Updated last year
Alternatives and similar repositories for parley
Users that are interested in parley are comparing it to the libraries listed below
Sorting:
- Data Scientists Go To Jupyter☆64Updated 3 months ago
- source code for the offsecml framework☆40Updated 11 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated 3 weeks ago
- A collection of prompt injection mitigation techniques.☆23Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆57Updated 3 months ago
- ☆43Updated last week
- using ML models for red teaming☆43Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆113Updated 5 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆71Updated last month
- General research for Dreadnode☆23Updated 11 months ago
- ☆14Updated 5 months ago
- ☆16Updated last year
- ☆65Updated 4 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆87Updated last year
- Integrate PyRIT in existing tools☆25Updated 3 months ago
- LLM Testing Findings Templates☆72Updated last year
- ☆40Updated 5 months ago
- A LLM explicitly designed for getting hacked☆149Updated last year
- ☆40Updated 8 months ago
- Copy cat model for Proofpoint☆83Updated 5 years ago
- Central repo for talks and presentations☆46Updated 10 months ago
- A research project to add some brrrrrr to Burp☆173Updated 3 months ago
- Payloads for Attacking Large Language Models☆89Updated 10 months ago
- Minimal workflows☆19Updated last year
- ☆16Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆70Updated last month
- XBOW Validation Benchmarks☆92Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- Dropbox LLM Security research code and results☆226Updated last year
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Updated last year