parameterlab / trapLinks
Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)
☆11Updated 6 months ago
Alternatives and similar repositories for trap
Users that are interested in trap are comparing it to the libraries listed below
Sorting:
- ☆40Updated 8 months ago
- General research for Dreadnode☆23Updated 11 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆87Updated last year
- Adversarial Tokenization☆22Updated last month
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated last year
- ☆63Updated 11 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 3 months ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Updated last year
- ☆34Updated 6 months ago
- ☆20Updated last year
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- ☆71Updated 6 months ago
- Central repo for talks and presentations☆46Updated 10 months ago
- Code for shelLM tool☆54Updated 4 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆49Updated 7 months ago
- using ML models for red teaming☆43Updated last year
- ☆16Updated last month
- A CLI wrapper for libmodsecurity (v3.0.10)☆12Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆51Updated 9 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Security Weaknesses in Machine Learning☆15Updated last year
- ☆16Updated last year
- ☆14Updated 5 months ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 3 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last month
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆158Updated 2 months ago
- Framework for Adversarial Malware Evaluation.☆34Updated 2 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- A collection of prompt injection mitigation techniques.☆23Updated last year