dreadnode / tensor-man
A utility to inspect, validate, sign and verify machine learning model files.
☆53Updated last month
Alternatives and similar repositories for tensor-man:
Users that are interested in tensor-man are comparing it to the libraries listed below
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆62Updated last month
- Tree of Attacks (TAP) Jailbreaking Implementation☆102Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆62Updated this week
- CLI and API server for https://github.com/dreadnode/robopages☆30Updated last month
- Data Scientists Go To Jupyter☆62Updated last week
- Lightweight LLM Interaction Framework☆246Updated this week
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 4 months ago
- ☆16Updated 10 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- General research for Dreadnode☆19Updated 8 months ago
- source code for the offsecml framework☆38Updated 9 months ago
- Automated vulnerability discovery and annotation☆65Updated 7 months ago
- ☆23Updated 2 months ago
- using ML models for red teaming☆42Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆89Updated 2 months ago
- ☆64Updated last month
- Integrate PyRIT in existing tools☆13Updated last week
- Minimal workflows☆17Updated 11 months ago
- https://arxiv.org/abs/2412.02776☆48Updated 3 months ago
- ☆64Updated 3 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆44Updated 4 months ago
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆14Updated 9 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆295Updated 3 weeks ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 4 months ago
- ☆16Updated 9 months ago
- HTML Smuggling with Web Assembly☆59Updated last year
- Open Source eBPF Malware Analysis Framework☆47Updated 4 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆60Updated 9 months ago