Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)
☆14Nov 20, 2024Updated last year
Alternatives and similar repositories for trap
Users that are interested in trap are comparing it to the libraries listed below
Sorting:
- ☆212Jul 24, 2025Updated 7 months ago
- Test equality between a black-box LLM API and a reference distribution☆12Oct 29, 2024Updated last year
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆13Feb 13, 2025Updated last year
- A curated collection of research and techniques for protecting intellectual property of large language models, including watermarking, fi…☆47Feb 15, 2026Updated last month
- ☆16Apr 11, 2017Updated 8 years ago
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated last year
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Official implementation for "HuRef: HUman-REadable Fingerprint for Large Language Models" (NeurIPS2024)☆15Jun 17, 2025Updated 9 months ago
- Tool to check DKIM-Signature of many emails and report results in a spreadsheet☆13Oct 21, 2016Updated 9 years ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.☆50Mar 13, 2026Updated last week
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆20Dec 10, 2024Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Jul 19, 2024Updated last year
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆13Oct 28, 2025Updated 4 months ago
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 7 months ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- [USENIX Security 2024] PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretrainin…☆24Nov 10, 2024Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆39Feb 14, 2026Updated last month
- ☆11Jun 7, 2025Updated 9 months ago
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆28Mar 24, 2025Updated 11 months ago
- Network Honeypot written in Rust☆15Mar 11, 2026Updated last week
- ☆68Sep 23, 2025Updated 5 months ago
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆29Feb 5, 2026Updated last month
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- Datasette plugin for outputting tables in formats suitable for copy and paste☆16Feb 17, 2024Updated 2 years ago
- The goal of this repo is to become a benchmark for pentesting☆22Oct 25, 2024Updated last year
- OWASP Foundation web repository☆58Updated this week
- Repository for CoSAI workstream 3, AI Risk Governance☆23Feb 18, 2026Updated last month
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆65Mar 11, 2026Updated last week
- [NeurIPS 2025] The official implementation of "T2SMark: Balancing Robustness and Diversity in Noise-as-Watermark for Diffusion Models"☆45Nov 2, 2025Updated 4 months ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- CCF推荐会议论文的获取和推送☆17Jun 3, 2024Updated last year
- ⚡ AI-powered directory listing scanner that hunts for exposed secrets and classifies security risks.☆37Sep 18, 2025Updated 6 months ago
- AI Robustness Evaluation System☆37Updated this week
- [EMNLP 24] Official Implementation of CLEANGEN: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models☆19Mar 9, 2025Updated last year
- Because we all have something to hide from someone☆20Apr 15, 2020Updated 5 years ago
- Python API for rewriting GTIRB files☆19Mar 9, 2026Updated last week