☆98Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for multimodal_injection
Users that are interested in multimodal_injection are comparing it to the libraries listed below
Sorting:
- Code for "Adversarial Illusions in Multi-Modal Embeddings"☆31Aug 4, 2024Updated last year
- ☆12Jul 16, 2025Updated 7 months ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆38Oct 17, 2024Updated last year
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆192Jun 26, 2025Updated 8 months ago
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆266May 13, 2024Updated last year
- Code for ICLR 2025 Failures to Find Transferable Image Jailbreaks Between Vision-Language Models☆37Jun 1, 2025Updated 9 months ago
- ☆58Aug 11, 2024Updated last year
- macOS dylib stager☆36Jan 22, 2025Updated last year
- [ECCV 2024] Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"☆86Nov 28, 2023Updated 2 years ago
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆19Feb 26, 2025Updated last year
- Explore, Establish, Exploit: Red Teaming Language Models from Scratch☆13Jun 21, 2023Updated 2 years ago
- Plugin Marketplace for Claude Code☆20Feb 8, 2026Updated 3 weeks ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆42Jul 8, 2024Updated last year
- ☆109Feb 16, 2024Updated 2 years ago
- ☆25Mar 16, 2025Updated 11 months ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 2 months ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 11 months ago
- [ICLR 2025] Official codebase for the ICLR 2025 paper "Multimodal Situational Safety"☆30Jun 23, 2025Updated 8 months ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆18Feb 16, 2025Updated last year
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆44Jul 26, 2021Updated 4 years ago
- Code and data for "ImgTrojan: Jailbreaking Vision-Language Models with ONE Image"☆24Mar 26, 2025Updated 11 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 6 months ago
- ☆24Jun 17, 2025Updated 8 months ago
- ☆55Dec 7, 2024Updated last year
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- General research for Dreadnode☆27Jun 17, 2024Updated last year
- Accepted by IJCAI-24 Survey Track☆231Aug 25, 2024Updated last year
- Craziness.☆29Feb 10, 2025Updated last year
- Universal and Transferable Attacks on Aligned Language Models☆4,534Aug 2, 2024Updated last year
- Accepted by ECCV 2024☆192Oct 15, 2024Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Sep 20, 2020Updated 5 years ago
- ☆197Apr 7, 2025Updated 11 months ago
- Installing wazuh SIEM Unified XDR and SIEM protection☆33Jun 3, 2025Updated 9 months ago
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆64Jun 6, 2019Updated 6 years ago