facebookresearch / privacy_adversarial_frameworkLinks
The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspired by MITRE ATT&CK®.
☆57Updated 2 years ago
Alternatives and similar repositories for privacy_adversarial_framework
Users that are interested in privacy_adversarial_framework are comparing it to the libraries listed below
Sorting:
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated 2 years ago
- Data Scientists Go To Jupyter☆68Updated 11 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated last week
- LLM Testing Findings Templates☆75Updated last year
- using ML models for red teaming☆45Updated 2 years ago
- ☆156Updated 5 months ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- source code for the offsecml framework☆44Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆84Updated 9 months ago
- ☆83Updated last week
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆157Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 9 months ago
- ☆71Updated 3 months ago
- Multi-agent system (MAS) hijacking demos☆40Updated this week
- ☆44Updated last year
- ☆114Updated 2 years ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆84Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- Payloads for Attacking Large Language Models☆119Updated 3 weeks ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆53Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- ☆60Updated 2 years ago
- Dropbox LLM Security research code and results☆254Updated last year
- A fun POC that is built to understand AI security agents.☆34Updated 3 months ago
- ☆116Updated 2 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆109Updated 2 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆33Updated last year
- https://arxiv.org/abs/2412.02776☆67Updated last year
- ATLAS tactics, techniques, and case studies data☆100Updated this week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year