Turning Gandalf against itself. Use LLMs to automate playing Lakera Gandalf challenge without needing to set up an account with a platform provider.
☆31Oct 16, 2023Updated 2 years ago
Alternatives and similar repositories for gandalf_vs_gandalf
Users that are interested in gandalf_vs_gandalf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A writeup for the Gandalf prompt injection game.☆40Mar 22, 2026Updated last month
- ☆11Jun 21, 2025Updated 10 months ago
- The InnerEye-Gateway is a Windows service that acts as a DICOM end point to run inference on https://github.com/microsoft/InnerEye-DeepLe…☆20Mar 21, 2024Updated 2 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- ☆10Jul 7, 2025Updated 9 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 10 years ago
- ☆70Apr 16, 2026Updated 2 weeks ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A blueprint for getting a React web app with a Node.js API and a MongoDB database onto Azure. The blueprint includes sample application c…☆24Jan 5, 2026Updated 3 months ago
- 🤗Transformers: State-of-the-art Natural Language Processing for Pytorch and TensorFlow 2.0.☆45Jun 12, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- LLM prompt attacks for hacker CTFs via CTFd.☆14Dec 17, 2023Updated 2 years ago
- R.A.Y.D.E.R revolutionizes security testing for generative AI by letting you test chatbots directly through their web interfaces. No API …☆16Mar 16, 2026Updated last month
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆26May 16, 2024Updated last year
- Get the URL from a web shortcut file☆15Aug 14, 2021Updated 4 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- No more certifi! System trust store at hand. In Pure Python.☆24Apr 7, 2026Updated 3 weeks ago
- Ensure a function is stable, meaning the same input always produces the same output☆16Nov 4, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Feb 14, 2026Updated 2 months ago
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- Get the bundle identifier of the default browser (macOS). Example: com.apple.Safari☆13Nov 14, 2025Updated 5 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated last year
- Discover how to build vision transformer from scratch with this comprehensive tutorial. Follow our step-by-step guide to create your own …☆11Apr 14, 2023Updated 3 years ago
- ES2015 Math.imul() ponyfill☆11Oct 30, 2023Updated 2 years ago
- Trim a consecutively repeated substring: foo--bar---baz → foo-bar-baz☆21Jul 9, 2022Updated 3 years ago
- ☆10Jul 20, 2023Updated 2 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆18Jul 26, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ES2015 Number.isFinite() ponyfill☆20Apr 7, 2021Updated 5 years ago
- Sample usage of the libdxg projects.☆14Jan 29, 2026Updated 3 months ago
- Strip a path from a path☆18Aug 18, 2021Updated 4 years ago
- Lustre Repository with MS patches☆17Updated this week
- Framework for creating fuzzers and negative tests for TLS 1.3 implementations☆13Mar 21, 2024Updated 2 years ago
- ☆13Jan 15, 2026Updated 3 months ago
- [DEPRECATED] A better Atom `TextEditor#setText()` that preserves cursor/scroll position and selections☆12Jan 24, 2021Updated 5 years ago