mik0w / pallmsView external linksLinks
Payloads for Attacking Large Language Models
☆119Jan 13, 2026Updated last month
Alternatives and similar repositories for pallms
Users that are interested in pallms are comparing it to the libraries listed below
Sorting:
- Dropbox LLM Security research code and results☆254May 21, 2024Updated last year
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- A curation of awesome tools, documents and projects about LLM Security.☆1,525Aug 20, 2025Updated 5 months ago
- Application which investigates defensive measures against prompt injection attacks on an LLM, with a focus on the exposure of external to…☆32Oct 24, 2024Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆33May 27, 2024Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆118Feb 7, 2024Updated 2 years ago
- A collection of awesome resources related AI security☆550Updated this week
- A LLM explicitly designed for getting hacked☆166Aug 2, 2023Updated 2 years ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆454Jan 31, 2024Updated 2 years ago
- ☆362Jun 25, 2025Updated 7 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Aug 22, 2024Updated last year
- ☆11Jun 22, 2020Updated 5 years ago
- Prompt Injection Primer for Engineers☆547Aug 25, 2023Updated 2 years ago
- LLM Testing Findings Templates☆75Feb 14, 2024Updated last year
- LLM prompt attacks for hacker CTFs via CTFd.☆15Dec 17, 2023Updated 2 years ago
- ☆140Jul 24, 2025Updated 6 months ago
- ☆14Jun 7, 2024Updated last year
- ☆12Aug 29, 2025Updated 5 months ago
- ☆15Jan 26, 2023Updated 3 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- New ways of breaking app-integrated LLMs☆2,052Jul 17, 2025Updated 6 months ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Python Module for parsing Apple ASL Logs☆15Apr 7, 2016Updated 9 years ago
- ☆31Feb 10, 2020Updated 6 years ago
- Lightweight LLM Interaction Framework☆406Feb 3, 2026Updated last week
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆339Feb 12, 2024Updated 2 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Jul 12, 2020Updated 5 years ago
- The DNN Security Analyzer is a module aimed at helping you to improve the security on your DNN website☆31Feb 11, 2019Updated 7 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated 11 months ago
- LLM Prompt Injection Detector☆1,415Aug 7, 2024Updated last year
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Secure-D Web Application Security Test Checklist summarizes well-known weaknesses, vulnerabilities and best practices into review topics …☆21Sep 21, 2020Updated 5 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year