☆146Jul 24, 2025Updated 7 months ago
Alternatives and similar repositories for LLMmap
Users that are interested in LLMmap are comparing it to the libraries listed below
Sorting:
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Fingerprint large language models☆49Jul 11, 2024Updated last year
- [CCS-LAMPS'24] LLM IP Protection Against Model Merging☆16Oct 14, 2024Updated last year
- CyberBench: A Multi-Task Cyber LLM Benchmark☆30Apr 29, 2025Updated 10 months ago
- The repository of the paper "REEF: Representation Encoding Fingerprints for Large Language Models," aims to protect the IP of open-source…☆74Jan 16, 2025Updated last year
- Code and data for paper "Can Watermarked LLMs be Identified by Users via Crafted Prompts?" Accepted by ICLR 2025 (Spotlight)☆28Dec 28, 2024Updated last year
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- ☆20Jan 30, 2026Updated last month
- ☆10Sep 25, 2024Updated last year
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- ☆14Feb 26, 2025Updated last year
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- ☆10Sep 24, 2025Updated 5 months ago
- A simple macOS debugger detection trick☆19Apr 7, 2025Updated 10 months ago
- [AISTATS 2025] Official implementation of "Adversarial Vulnerabilities in Large Language Models for Time Series Forecasting"☆15Apr 30, 2025Updated 10 months ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year
- (CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞☆12Apr 28, 2021Updated 4 years ago
- Research Links for LLM Security☆17May 27, 2024Updated last year
- Payloads for Attacking Large Language Models☆127Jan 13, 2026Updated last month
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Mar 14, 2022Updated 3 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- ☆25Mar 16, 2025Updated 11 months ago
- Code and data for paper "Can LLM Watermarks Robustly Prevent Unauthorized Knowledge Distillation?". (ACL 2025 Main)☆21Jun 18, 2025Updated 8 months ago
- ☆23Jan 17, 2025Updated last year
- Want a high-accuracy voice clone quickly? Welcome to Tailored Swift! This collection offers phonetically balanced scripts covering the fu…☆24Nov 19, 2024Updated last year
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- A prompt defence is a multi-layer defence that can be used to protect your applications against prompt injection attacks.☆21Dec 12, 2025Updated 2 months ago
- ☆17May 11, 2025Updated 9 months ago
- Implementation of Patch-wise Adversarial Regularization from "Learning Robust Global Representations by Penalizing Local Predictive Power…☆18Oct 27, 2019Updated 6 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- ☆142Jan 28, 2026Updated last month
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Sep 9, 2024Updated last year
- ☆25Nov 24, 2025Updated 3 months ago
- ☆47Mar 29, 2022Updated 3 years ago
- In this open-source project, we are seeking to implement a two-step verification solution for Leiden University student accounts that is …☆17Aug 13, 2025Updated 6 months ago
- ☆19Mar 6, 2023Updated 2 years ago
- This repository contains the implementation for the paper "AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models v…☆58Sep 2, 2024Updated last year
- ☆24Aug 18, 2023Updated 2 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago