☆12Dec 22, 2025Updated 2 months ago
Alternatives and similar repositories for PromSec
Users that are interested in PromSec are comparing it to the libraries listed below
Sorting:
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆31Nov 22, 2025Updated 3 months ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Feb 23, 2026Updated last week
- ☆51Jul 16, 2024Updated last year
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆63May 8, 2023Updated 2 years ago
- BPE Tokenizer implementations in C# for Anthropic, OpenAI LLM offerings☆15Oct 5, 2023Updated 2 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- Code for Findings-EMNLP 2023 paper: Multi-step Jailbreaking Privacy Attacks on ChatGPT☆36Oct 15, 2023Updated 2 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 8 months ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- 支付宝推荐的公钥证书方式模式SDK、示例及相关工具☆11May 7, 2023Updated 2 years ago
- ☆13Oct 11, 2024Updated last year
- Ionic Vue Web Components - Split-Screen aka SideMenu☆11Jan 6, 2023Updated 3 years ago
- ☆44Jan 6, 2025Updated last year
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- XSS that opens Blobbypass. It can be useful for webview bypasses.☆12Jun 5, 2025Updated 8 months ago
- Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security☆26Dec 25, 2025Updated 2 months ago
- 🚧 💻 华中科技大 学计算机硬件系统设计(自己动手画 CPU)相关资料和 Logisim 实现☆13Jan 28, 2026Updated last month
- Proof Of Concept For CVE-2025-59489. Affects unity games running on Android.☆36Oct 6, 2025Updated 4 months ago
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- ☆11Mar 5, 2023Updated 2 years ago
- Implementation of joint bayesian model, written in python.☆11Aug 2, 2021Updated 4 years ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 9 months ago
- CoPur: Certifiably Robust Collaborative Inference via Feature Purification (NeurIPS 2022)☆11Dec 7, 2022Updated 3 years ago
- Heterogeneous Model Reuse via Optimizing Multiparty Multiclass Margin☆11Jan 15, 2020Updated 6 years ago
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated last month
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- A library to facilitate the static analysis of Android apps☆15Jul 22, 2025Updated 7 months ago
- pyDYNAM-O: The Dynamic Oscillation Toolbox for Python☆11Jan 30, 2023Updated 3 years ago
- Developer focused AI Gateway☆15Mar 7, 2025Updated 11 months ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- [ACL'24 Findings] Official code for "TLCR: Token-Level Continuous Reward for Fine-grained Reinforcement Learning from Human Feedback"☆12Dec 6, 2024Updated last year
- 1-step Q Learning from the paper "Asynchronous Methods for Deep Reinforcement Learning"☆12Mar 13, 2017Updated 8 years ago
- Hyperledger Hands-On second edition - REST layer of the Trade Network☆10Jun 1, 2021Updated 4 years ago
- ☆10Sep 25, 2024Updated last year
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- This is the code of our work CISS Certified Robustness Against Natural Language Attacks by Causal Intervention published on ICML 2022☆11Dec 6, 2022Updated 3 years ago