google-research / camel-prompt-injectionView external linksLinks
Code for the paper "Defeating Prompt Injections by Design"
☆252Jun 20, 2025Updated 7 months ago
Alternatives and similar repositories for camel-prompt-injection
Users that are interested in camel-prompt-injection are comparing it to the libraries listed below
Sorting:
- ☆13Mar 9, 2025Updated 11 months ago
- ☆27Sep 11, 2025Updated 5 months ago
- A research workbench for developing and testing attacks against large language models, with a focus on prompt injection vulnerabilities a…☆37Updated this week
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆431Feb 3, 2026Updated last week
- ☆28Aug 31, 2025Updated 5 months ago
- ☆18Apr 15, 2024Updated last year
- Agent Security Bench (ASB)☆183Oct 27, 2025Updated 3 months ago
- A repo for generating random NFTs with metadata 100% on chain!☆37Mar 8, 2024Updated last year
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 10 months ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 5 months ago
- Extract streaming data from text using prefix completion.☆10Oct 6, 2024Updated last year
- stay on top of your favorite blogs☆52Jan 4, 2026Updated last month
- ☆34Aug 6, 2025Updated 6 months ago
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆84Jul 24, 2025Updated 6 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆12Mar 31, 2021Updated 4 years ago
- Codes for our paper "AgentMonitor: A Plug-and-Play Framework for Predictive and Secure Multi-Agent Systems"☆13Dec 13, 2024Updated last year
- a prompt injection scanner for custom LLM applications☆19Feb 16, 2025Updated last year
- First Trusted MCP server running on AWS Nitro Enclave Trusted Execution Environment☆16Apr 5, 2025Updated 10 months ago
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 5 months ago
- ☆14Sep 17, 2024Updated last year
- A discord bot to stay up to date with Hugging Face Daily Papers.☆13Apr 8, 2024Updated last year
- Set of tools helping developers to build TEE-enabled application quicker.☆17Aug 22, 2025Updated 5 months ago
- Implement of Implicit Knowledge Extraction Attack.☆18May 28, 2025Updated 8 months ago
- All tools developed by myself for personal purposes.☆16Feb 1, 2026Updated 2 weeks ago
- ☆14Jun 7, 2024Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- ☆21Mar 20, 2025Updated 10 months ago
- AI Pull-Request Reviewer Companion (in the command line)☆13Apr 11, 2024Updated last year
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆15Feb 9, 2026Updated last week
- Example agents for the Dreadnode platform☆22Dec 19, 2025Updated last month
- Parseltongue 3.1 - LLM Payload Crafter for AI safety research☆56Nov 14, 2025Updated 3 months ago
- Loads .NET Assembly Via CLR Loader☆17Mar 6, 2019Updated 6 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆26Mar 26, 2025Updated 10 months ago
- An external retriever for GPTs implemented with Zilliz Cloud Pipelines, a more flexible and economic alternative to default GPTs knowledg…☆16Mar 20, 2024Updated last year
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 10 months ago
- DEFCON 31 slide deck and video link☆66Jun 2, 2025Updated 8 months ago
- ☆38Oct 12, 2025Updated 4 months ago