peluche / deck-of-many-promptsLinks
Manual Prompt Injection / Red Teaming Tool
☆31Updated 8 months ago
Alternatives and similar repositories for deck-of-many-prompts
Users that are interested in deck-of-many-prompts are comparing it to the libraries listed below
Sorting:
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- A steganography tool for automatically encoding images that act as prompt injections/jailbreaks for AIs with code interpreter and vision.☆91Updated 7 months ago
- https://arxiv.org/abs/2412.02776☆54Updated 6 months ago
- MCP server for querying the Shodan API☆49Updated 3 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 6 months ago
- ☆14Updated 5 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆71Updated last month
- OllaDeck is a purple technology stack for Generative AI (text modality) cybersecurity. It provides a comprehensive set of tools for both …☆18Updated 8 months ago
- ☆22Updated last year
- Penetration Testing AI Assistant based on open source LLMs.☆79Updated last month
- A collection of prompt injection mitigation techniques.☆23Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆27Updated 5 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last month
- Codebase of https://arxiv.org/abs/2410.14923☆47Updated 7 months ago
- This is the official repository for the code used in the paper: "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants", USEN…☆52Updated 4 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆113Updated 5 months ago
- The purpose of this document is to outline the security risks and vulnerabilities that may arise when implementing ChatGPT in web applica…☆29Updated 4 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- ☆65Updated 4 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆49Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆57Updated 4 months ago
- ☆16Updated last year
- A guide to LLM hacking: fundamentals, prompt injection, offense, and defense☆157Updated 2 years ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 3 months ago
- ☆33Updated 2 months ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆23Updated last year
- MCP server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.☆23Updated 3 months ago
- An example vulnerable app that integrates an LLM☆21Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆32Updated 2 months ago
- Visualize BBOT scans in realtime with VivaGraphJS☆47Updated 7 months ago