pasquini-dario / LLMmapLinks
☆40Updated 8 months ago
Alternatives and similar repositories for LLMmap
Users that are interested in LLMmap are comparing it to the libraries listed below
Sorting:
- General research for Dreadnode☆23Updated 11 months ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆87Updated last year
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆11Updated 6 months ago
- ☆63Updated 11 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 3 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆48Updated 7 months ago
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆53Updated last month
- A collection of prompt injection mitigation techniques.☆23Updated last year
- ☆71Updated 6 months ago
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆80Updated 4 months ago
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆51Updated 9 months ago
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆157Updated 2 months ago
- Agent Security Bench (ASB)☆81Updated last month
- Fine-tuning base models to build robust task-specific models☆30Updated last year
- Code snippets to reproduce MCP tool poisoning attacks.☆132Updated last month
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆110Updated last year
- using ML models for red teaming☆43Updated last year
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆113Updated 5 months ago
- ☆57Updated 5 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated last year
- ☆45Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆45Updated 2 months ago
- LLM security and privacy☆49Updated 7 months ago
- Papers about red teaming LLMs and Multimodal models.☆121Updated last week
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆93Updated 7 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆79Updated 8 months ago
- ☆53Updated 3 weeks ago
- TAP: An automated jailbreaking method for black-box LLMs☆170Updated 5 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆77Updated last month