☆14Mar 9, 2025Updated last year
Alternatives and similar repositories for Secure_LLM_System
Users that are interested in Secure_LLM_System are comparing it to the libraries listed below
Sorting:
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆27Mar 26, 2025Updated 11 months ago
- ☆30Oct 23, 2024Updated last year
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆44Mar 12, 2026Updated last week
- ☆32Sep 11, 2025Updated 6 months ago
- Code repo for the paper: Attacking Vision-Language Computer Agents via Pop-ups☆51Dec 23, 2024Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆96Jan 20, 2025Updated last year
- Code to generate NeuralExecs (prompt injection for LLMs)☆27Oct 5, 2025Updated 5 months ago
- ☆29Aug 31, 2025Updated 6 months ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆89Jul 24, 2025Updated 7 months ago
- Lomas: The data oases hidden behind the mist. A platform for confidential analysis of private data.☆29Mar 13, 2026Updated last week
- ☆52Feb 8, 2025Updated last year
- Code for Voice Jailbreak Attacks Against GPT-4o.☆37May 31, 2024Updated last year
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- 北京邮电大学信通院C++上机题☆14Feb 20, 2021Updated 5 years ago
- use angr to deobfuscation☆10Oct 8, 2019Updated 6 years ago
- Agent Security Bench (ASB)☆201Oct 27, 2025Updated 4 months ago
- ☆12Nov 7, 2025Updated 4 months ago
- ☆27Sep 15, 2024Updated last year
- Codebase for Obfuscated Activations Bypass LLM Latent-Space Defenses☆29Feb 11, 2025Updated last year
- Codes for our paper "AgentMonitor: A Plug-and-Play Framework for Predictive and Secure Multi-Agent Systems"☆13Dec 13, 2024Updated last year
- Code and datasets for the salesforce AI research paper on prompt leakage and multi-turn threats against LLMs☆21Nov 10, 2025Updated 4 months ago
- ☆13Dec 28, 2024Updated last year
- Flow Integrity Deterministic Enforcement System. Mechanisms for securing AI agents with information-flow control.☆80May 30, 2025Updated 9 months ago
- Camouflage YOLO - (CAMOLO) trains adversarial patches to confuse the YOLO family of object detectors.☆12Oct 20, 2022Updated 3 years ago
- IRC-like chat program using POSIX advisory lock covert-channel on time namespaces☆23Nov 12, 2025Updated 4 months ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 6 months ago
- This is the repository that introduces research topics related to protecting intellectual property (IP) of AI from a data-centric perspec…☆23Oct 30, 2023Updated 2 years ago
- ☆37Sep 30, 2024Updated last year
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆42Feb 11, 2026Updated last month
- Code for the paper "Defeating Prompt Injections by Design"☆284Jun 20, 2025Updated 9 months ago
- Micro Jack Lisp - For ESP8266 and Raspberry PI☆14Jun 1, 2016Updated 9 years ago
- ☆14Mar 10, 2025Updated last year
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆39Feb 14, 2026Updated last month
- Codebase of https://arxiv.org/abs/2410.14923☆54Oct 22, 2024Updated last year
- ☆25Jul 27, 2024Updated last year
- Conditional JSON Schema form functionality/wrapper for @rjsf/core☆14Dec 1, 2023Updated 2 years ago
- ☆15Sep 17, 2024Updated last year
- [ACL 2024] Raccoon: Prompt Extraction Benchmark of LLM-Integrated Applications☆14May 24, 2024Updated last year