☆100Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for multimodal_injection
Users that are interested in multimodal_injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for "Adversarial Illusions in Multi-Modal Embeddings"☆32Aug 4, 2024Updated last year
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆40Oct 17, 2024Updated last year
- Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtime☆54Sep 19, 2023Updated 2 years ago
- ☆13Jul 16, 2025Updated 10 months ago
- Repository for the Paper (AAAI 2024, Oral) --- Visual Adversarial Examples Jailbreak Large Language Models☆275May 13, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [ICLR 2024 Spotlight 🔥 ] - [ Best Paper Award SoCal NLP 2023 🏆] - Jailbreak in pieces: Compositional Adversarial Attacks on Multi-Modal…☆81Jun 6, 2024Updated last year
- Code for ICLR 2025 Failures to Find Transferable Image Jailbreaks Between Vision-Language Models☆36Jun 1, 2025Updated 11 months ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Mar 14, 2022Updated 4 years ago
- [ECCV 2024] Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"☆87Nov 28, 2023Updated 2 years ago
- Explore, Establish, Exploit: Red Teaming Language Models from Scratch☆15Jun 21, 2023Updated 2 years ago
- ☆60Jun 5, 2024Updated last year
- ☆46Dec 9, 2025Updated 5 months ago
- [ICLR2025] Detecting Backdoor Samples in Contrastive Language Image Pretraining☆20Feb 26, 2025Updated last year
- Code and data for "ImgTrojan: Jailbreaking Vision-Language Models with ONE Image"☆24Mar 26, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for the paper "BadPrompt: Backdoor Attacks on Continuous Prompts"☆40Jul 8, 2024Updated last year
- Code for the paper "Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models" (NAACL-…☆45Jul 26, 2021Updated 4 years ago
- ☆56Dec 7, 2024Updated last year
- [TMLR 2025] Official implementation of AttnGCG: Enhancing Jailbreaking Attacks on LLMs with Attention Manipulation☆26Jun 17, 2025Updated 11 months ago
- ☆109Feb 16, 2024Updated 2 years ago
- PromptInject is a framework that assembles prompts in a modular fashion to provide a quantitative analysis of the robustness of LLMs to a…☆494Apr 27, 2026Updated 3 weeks ago
- [ICLR 2025] Official codebase for the ICLR 2025 paper "Multimodal Situational Safety"☆35Jun 23, 2025Updated 10 months ago
- Official Repository for Dataset Inference for LLMs☆41Jul 25, 2024Updated last year
- LLM prompt attacks for hacker CTFs via CTFd.☆14Dec 17, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆126Apr 15, 2024Updated 2 years ago
- A reading list for large models safety, security, and privacy (including Awesome LLM Security, Safety, etc.).☆1,957May 2, 2026Updated 2 weeks ago
- ☆169Sep 2, 2024Updated last year
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 4 years ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆17Feb 16, 2025Updated last year
- macOS dylib stager☆36Jan 22, 2025Updated last year
- General research for Dreadnode☆27Jun 17, 2024Updated last year
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆21May 9, 2026Updated last week
- Repository for the Paper: Leave My Images Alone: Preventing Multi-Modal Large Language Models from Analyzing Images via Visual Prompt Inj…☆19Apr 17, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A collection of sample code used in some experiments with Sliver C2☆17Mar 28, 2023Updated 3 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- Code for the paper "Watermarking Makes Language Models Radioactive"☆22Oct 25, 2024Updated last year
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆46Aug 10, 2025Updated 9 months ago
- Universal and Transferable Attacks on Aligned Language Models☆4,661Aug 2, 2024Updated last year
- 一款集成AI对话(ChatGpt)、群聊摸鱼、定时任务、公众号文章推送、文章摘要等功能的wechat机器人☆13Sep 5, 2024Updated last year