secwest / LLM-Attack-Defend
Research Links for LLM Security
☆17Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for LLM-Attack-Defend
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Updated 7 months ago
- Simple WebSocket fuzzer☆32Updated last year
- #INFILTRATE19 raptor's party pack.☆30Updated 10 months ago
- The Dumb Network Fuzzer☆19Updated last year
- ☆21Updated 5 months ago
- ☆14Updated last year
- ☆12Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆22Updated 8 months ago
- ☆12Updated last year
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated 10 months ago
- ☆31Updated 5 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆15Updated 8 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated 8 months ago
- #INFILTRATE20 raptor's party pack.☆28Updated 10 months ago
- A collection of various exploits☆25Updated last month
- BINARLY Research Tools and PoCs☆34Updated last month
- ☆9Updated 3 weeks ago
- ☆15Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆52Updated last year
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 5 years ago
- some sploits☆17Updated last month
- ☆26Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆63Updated last year
- Diaphora Machine Learning tools and datasets☆18Updated last month
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- ☆19Updated last year
- Cisco RV110w UPnP stack overflow☆25Updated 3 years ago