Turning Gandalf against itself. Use LLMs to automate playing Lakera Gandalf challenge without needing to set up an account with a platform provider.
☆30Oct 16, 2023Updated 2 years ago
Alternatives and similar repositories for gandalf_vs_gandalf
Users that are interested in gandalf_vs_gandalf are comparing it to the libraries listed below
Sorting:
- Lakera - ChatGPT Data Leak Protection☆29Jul 4, 2024Updated last year
- [Corca / ML] Automatically solved Gandalf AI with LLM☆52Jul 11, 2023Updated 2 years ago
- A writeup for the Gandalf prompt injection game.☆39Jun 15, 2023Updated 2 years ago
- ☆11Jun 21, 2025Updated 8 months ago
- The InnerEye-Gateway is a Windows service that acts as a DICOM end point to run inference on https://github.com/microsoft/InnerEye-DeepLe…☆19Mar 21, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- ☆10Jul 7, 2025Updated 8 months ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- ☆10Mar 6, 2026Updated last week
- ☆91Feb 28, 2026Updated 2 weeks ago
- ☆15Nov 11, 2025Updated 4 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Accept payments in Bitcoin Cash in WooCommerce with CryptoWoo.☆12Oct 3, 2021Updated 4 years ago
- ☆63Feb 28, 2026Updated 2 weeks ago
- ☆16Jun 20, 2022Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A blueprint for getting a React web app with a Node.js API and a MongoDB database onto Azure. The blueprint includes sample application c…☆24Jan 5, 2026Updated 2 months ago
- 🤗Transformers: State-of-the-art Natural Language Processing for Pytorch and TensorFlow 2.0.☆45Jun 12, 2023Updated 2 years ago
- ☆15Feb 1, 2024Updated 2 years ago
- LLM prompt attacks for hacker CTFs via CTFd.☆15Dec 17, 2023Updated 2 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- 🤫 Code and benchmark for our ICLR 2024 spotlight paper: "Can LLMs Keep a Secret? Testing Privacy Implications of Language Models via Con…☆50Dec 20, 2023Updated 2 years ago
- R.A.Y.D.E.R revolutionizes security testing for generative AI by letting you test chatbots directly through their web interfaces. No API …☆16Updated this week
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆26May 16, 2024Updated last year
- Get the URL from a web shortcut file☆14Aug 14, 2021Updated 4 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆17Jul 26, 2024Updated last year
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 2 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- Ensure a function is stable, meaning the same input always produces the same output☆16Nov 4, 2023Updated 2 years ago
- No more certifi! System trust store at hand. In Pure Python.☆23Updated this week
- ☆15Feb 14, 2026Updated last month
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Get the bundle identifier of the default browser (macOS). Example: com.apple.Safari☆13Nov 14, 2025Updated 4 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- HFT Triangular arbitrage analysis package☆10Dec 19, 2023Updated 2 years ago
- Convert matching single-quotes to double-quotes: `I 'love' unicorns` → `I "love" unicorns`☆24Jul 9, 2022Updated 3 years ago
- Discover how to build vision transformer from scratch with this comprehensive tutorial. Follow our step-by-step guide to create your own …☆11Apr 14, 2023Updated 2 years ago