dreadnode / parley
Tree of Attacks (TAP) Jailbreaking Implementation
☆104Updated last year
Alternatives and similar repositories for parley:
Users that are interested in parley are comparing it to the libraries listed below
- Data Scientists Go To Jupyter☆62Updated last week
- source code for the offsecml framework☆38Updated 9 months ago
- General research for Dreadnode☆19Updated 8 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆53Updated last month
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆62Updated last month
- ☆16Updated 10 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆89Updated 2 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆80Updated 10 months ago
- using ML models for red teaming☆42Updated last year
- ☆64Updated last month
- Integrate PyRIT in existing tools☆13Updated last week
- A collection of prompt injection mitigation techniques.☆20Updated last year
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated 3 weeks ago
- Payloads for Attacking Large Language Models☆75Updated 8 months ago
- A research project to add some brrrrrr to Burp☆134Updated last month
- Central repo for talks and presentations☆44Updated 7 months ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆56Updated last year
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆59Updated last year
- CLI and API server for https://github.com/dreadnode/robopages☆30Updated last month
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 4 months ago
- Minimal workflows☆17Updated 11 months ago
- Copy cat model for Proofpoint☆82Updated 4 years ago
- Automated vulnerability discovery and annotation☆65Updated 7 months ago
- LLM Testing Findings Templates☆68Updated last year
- ☆37Updated 3 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆48Updated 7 months ago
- A LLM explicitly designed for getting hacked☆139Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 4 months ago