Dropbox LLM Security research code and results
☆255May 21, 2024Updated last year
Alternatives and similar repositories for llm-security
Users that are interested in llm-security are comparing it to the libraries listed below
Sorting:
- Payloads for Attacking Large Language Models☆122Jan 13, 2026Updated last month
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- Prompt Injection Primer for Engineers☆555Aug 25, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- New ways of breaking app-integrated LLMs☆2,053Jul 17, 2025Updated 7 months ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- A collection of prompt injection mitigation techniques.☆27Aug 19, 2023Updated 2 years ago
- Every practical and proposed defense against prompt injection.☆642Feb 22, 2025Updated last year
- LLM Prompt Injection Detector☆1,423Aug 7, 2024Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆34Oct 24, 2024Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆33May 27, 2024Updated last year
- ☆381Apr 18, 2024Updated last year
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- PromptInject is a framework that assembles prompts in a modular fashion to provide a quantitative analysis of the robustness of LLMs to a…☆455Feb 26, 2024Updated 2 years ago
- the LLM vulnerability scanner☆7,088Updated this week
- a security scanner for custom LLM applications☆1,134Dec 1, 2025Updated 3 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- Example Code Review Exercise☆14Apr 14, 2025Updated 10 months ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 3 months ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Protection against Model Serialization Attacks☆646Feb 18, 2026Updated last week
- a hackbot proof-of-concept☆41Feb 24, 2024Updated 2 years ago
- ☆370Jun 25, 2025Updated 8 months ago
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.☆24Aug 28, 2025Updated 6 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆318Aug 22, 2024Updated last year
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- A curation of awesome tools, documents and projects about LLM Security.☆1,530Aug 20, 2025Updated 6 months ago
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415☆27Oct 18, 2023Updated 2 years ago
- ☆114Jun 8, 2023Updated 2 years ago
- Whispers in the Machine: Confidentiality in Agentic Systems☆41Dec 11, 2025Updated 2 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆167Oct 13, 2023Updated 2 years ago