dreadnode / researchLinks
General research for Dreadnode
☆25Updated last year
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below
Sorting:
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆91Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆140Updated 9 months ago
- ☆68Updated 2 months ago
- Adversarial Tokenization☆29Updated last month
- ☆89Updated 10 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 7 months ago
- ☆65Updated last month
- Arxiv + Notion Sync☆20Updated 5 months ago
- ☆92Updated last year
- Papers about red teaming LLMs and Multimodal models.☆144Updated 4 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆60Updated 11 months ago
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆55Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆58Updated 8 months ago
- All things specific to LLM Red Teaming Generative AI☆29Updated 11 months ago
- ☆14Updated last year
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆23Updated last month
- Example agents for the Dreadnode platform☆17Updated 2 months ago
- https://arxiv.org/abs/2412.02776☆62Updated 10 months ago
- Data Scientists Go To Jupyter☆66Updated 7 months ago
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆166Updated 9 months ago
- ☆35Updated 11 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆78Updated 5 months ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆13Updated 10 months ago
- ☆80Updated last year
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆17Updated last year
- using ML models for red teaming☆44Updated 2 years ago
- ☆19Updated 9 months ago
- TAP: An automated jailbreaking method for black-box LLMs☆188Updated 10 months ago