SkillJect: Automating Stealthy Skill-Based Prompt Injection for Coding Agents with Trace-Driven Closed-Loop Refinement
☆47Mar 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for SkillJect
Users that are interested in SkillJect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆159Mar 30, 2026Updated last week
- [ICML 2025] Speak Easy: Eliciting Harmful Jailbreaks from LLMs with Simple Interactions☆14Mar 7, 2026Updated last month
- This repo is the artifact of FUEL☆14Dec 2, 2025Updated 4 months ago
- [CVPR 2023] Adversarial Robustness via Random Projection Filters☆13Jun 20, 2023Updated 2 years ago
- Official Implementation of VoxTracer (MM' 23)☆11Oct 27, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Jul 11, 2023Updated 2 years ago
- ☆11Nov 1, 2023Updated 2 years ago
- ☆13Jan 16, 2025Updated last year
- this is for the ACM MM paper---Backdoor Attack on Crowd Counting☆17Jul 10, 2022Updated 3 years ago
- ☆12Mar 5, 2024Updated 2 years ago
- [NeurIPS'25] Backdoor Cleaning without External Guidance in MLLM Fine-tuning☆19Oct 13, 2025Updated 5 months ago
- 武汉大学 iCalendar 校历☆12Updated this week
- [ICSE 2025] The Seeds of the FUTURE Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries (AC…☆21Dec 22, 2025Updated 3 months ago
- The official repository for guided jailbreak benchmark☆29Jul 28, 2025Updated 8 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- a secret detection tool☆40Mar 1, 2026Updated last month
- ☆13Jun 1, 2024Updated last year
- An implementation for MLLM oversensitivity evaluation☆18Nov 16, 2024Updated last year
- ☆21Sep 16, 2024Updated last year
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆22Mar 7, 2025Updated last year
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers☆16Oct 24, 2024Updated last year
- ☆23Dec 14, 2023Updated 2 years ago
- Benchmark for Hetergeneous Federated Learning by MARS Group at the Wuhan University, led by Prof. Mang Ye.☆19May 29, 2023Updated 2 years ago
- ☆28Jan 9, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Fuzz everything! Now let's fuzz chip!☆38Updated this week
- 一个基于LLM的多Agent全流程漏洞挖掘项目,支持PHP、Java、Python、Go、Node.js等多种语言项目环境搭建、漏洞分析、漏洞验证、报告产出。支持多Agent并发高效率完成漏洞挖掘任务,下个版本将会大更新。☆130Jan 30, 2026Updated 2 months ago
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆39Jan 17, 2025Updated last year
- Federated Learning in CVPR2024☆24Jun 6, 2024Updated last year
- ☆22Apr 23, 2024Updated last year
- [MM '24] EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second☆28Nov 19, 2024Updated last year
- The Personality Illusion: Revealing Dissociation Between Self-Reports & Behavior in LLMs.☆80Jan 10, 2026Updated 2 months ago
- About face technology☆20Feb 9, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆44Apr 3, 2026Updated last week
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆48Sep 10, 2025Updated 6 months ago
- [ICLR 2025] PyTorch Implementation of "ETA: Evaluating Then Aligning Safety of Vision Language Models at Inference Time"☆31Jul 20, 2025Updated 8 months ago
- MAPO: MIXED ADVANTAGE POLICY OPTIMIZATION☆39Sep 24, 2025Updated 6 months ago
- Multi-Faceted Distillation of Base-Novel Commonality for Few-shot Object Detection, ECCV 2022☆34Mar 23, 2023Updated 3 years ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆26Jul 22, 2023Updated 2 years ago