Tree of Attacks (TAP) Jailbreaking Implementation
☆118Feb 7, 2024Updated 2 years ago
Alternatives and similar repositories for parley
Users that are interested in parley are comparing it to the libraries listed below
Sorting:
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- A utility to inspect, validate, sign and verify machine learning model files.☆67Feb 5, 2025Updated last year
- Minimal workflows☆21Mar 19, 2024Updated 2 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- ☆18Apr 15, 2024Updated last year
- General research for Dreadnode☆27Jun 17, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- Arxiv + Notion Sync☆20May 12, 2025Updated 10 months ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- Central repo for talks and presentations☆47Jul 23, 2024Updated last year
- ☆16May 30, 2024Updated last year
- Copy cat model for Proofpoint☆91Apr 30, 2020Updated 5 years ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84May 2, 2025Updated 10 months ago
- Lightweight LLM Interaction Framework☆407Updated this week
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆90May 14, 2024Updated last year
- Persistence via Shell Extensions☆64Aug 4, 2023Updated 2 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Collection of red machine learning projects☆42Aug 16, 2021Updated 4 years ago
- ☆12Feb 19, 2026Updated last month
- Demo of using WASM to sandbox Plotly execution☆19Mar 30, 2025Updated 11 months ago
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated last month
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆26Nov 8, 2024Updated last year
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- a CLI that provides a generic automation layer for assessing the security of ML models☆914Jul 18, 2025Updated 8 months ago
- TAP: An automated jailbreaking method for black-box LLMs☆222Dec 10, 2024Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- Finding security vulnerabilities with CodeQL in C/C++☆14Mar 25, 2021Updated 4 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- ☆10May 25, 2023Updated 2 years ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆347Feb 12, 2024Updated 2 years ago
- Submission, compilation and execution of C# code snippets, using an unmanaged CLR Host☆53Jan 29, 2015Updated 11 years ago
- Payloads for Attacking Large Language Models☆129Jan 13, 2026Updated 2 months ago
- ☆17Apr 9, 2024Updated last year