haizelabs / BEAST-implementationLinks
☆16Updated last year
Alternatives and similar repositories for BEAST-implementation
Users that are interested in BEAST-implementation are comparing it to the libraries listed below
Sorting:
- ☆65Updated 5 months ago
- General research for Dreadnode☆23Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆57Updated 4 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆110Updated last year
- A subset of jailbreaks automatically discovered by the Haize Labs haizing suite.☆91Updated 2 months ago
- Thorn in a HaizeStack test for evaluating long-context adversarial robustness.☆26Updated 10 months ago
- Red-Teaming Language Models with DSPy☆198Updated 4 months ago
- Sphynx Hallucination Induction☆54Updated 4 months ago
- A collection of prompt injection mitigation techniques.☆22Updated last year
- A prompt injection game to collect data for robust ML research☆62Updated 5 months ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆51Updated 10 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆88Updated last year
- Code for the paper "Fishing for Magikarp"☆157Updated last month
- A library for red-teaming LLM applications with LLMs.☆26Updated 8 months ago
- Data Scientists Go To Jupyter☆63Updated 3 months ago
- Vivaria is METR's tool for running evaluations and conducting agent elicitation research.☆96Updated this week
- Scale your LLM-as-a-judge.☆240Updated 3 weeks ago
- ☆22Updated last year
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆56Updated last week
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆30Updated last week
- Improve prompts for e.g. GPT3 and GPT-J using templates and hyperparameter optimization.☆42Updated 2 years ago
- ☆116Updated 2 weeks ago
- ☆34Updated 7 months ago
- Code to break Llama Guard☆31Updated last year
- ☆37Updated last week
- ☆33Updated 3 weeks ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year
- A re-implementation of the "Red Teaming Language Models with Language Models" paper by Perez et al., 2022☆33Updated last year
- A better way of testing, inspecting, and analyzing AI Agent traces.☆38Updated 3 weeks ago