forcesunseen / llm-hackers-handbook
A guide to LLM hacking: fundamentals, prompt injection, offense, and defense
☆148Updated 2 years ago
Alternatives and similar repositories for llm-hackers-handbook:
Users that are interested in llm-hackers-handbook are comparing it to the libraries listed below
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆162Updated last year
- A LLM explicitly designed for getting hacked☆147Updated last year
- Prompt Injections Everywhere☆116Updated 8 months ago
- Payloads for Attacking Large Language Models☆79Updated 9 months ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆110Updated 2 years ago
- Penetration Testing AI Assistant based on open source LLMs.☆65Updated 2 weeks ago
- Learn about a type of vulnerability that specifically targets machine learning models☆258Updated 10 months ago
- ☆265Updated last year
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆279Updated 8 months ago
- A list of curated resources for people interested in AI Red Teaming, Jailbreaking, and Prompt Injection☆101Updated last week
- Prompt Injection Primer for Engineers☆430Updated last year
- ☆228Updated 10 months ago
- Dropbox LLM Security research code and results☆222Updated 11 months ago
- CTF challenges designed and implemented in machine learning applications☆144Updated 7 months ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆47Updated last year
- This repository contains various attack against Large Language Models.☆104Updated 11 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆162Updated 2 years ago
- A collection of awesome resources related AI security☆206Updated this week
- ☆132Updated last year
- LLM Powered Pentesting for your software☆97Updated last year
- some prompt about cyber security☆198Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 5 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆63Updated 2 months ago
- ☆60Updated this week
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆62Updated 10 months ago
- ☆242Updated 3 months ago
- An Interface for AI built for cybersecurity professionals☆91Updated 2 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Search for sensitive data in Postman public library.☆204Updated 3 months ago
- The Arcanum Prompt Injection Taxonomy☆60Updated last week