Research Links for LLM Security
☆17May 27, 2024Updated last year
Alternatives and similar repositories for LLM-Attack-Defend
Users that are interested in LLM-Attack-Defend are comparing it to the libraries listed below
Sorting:
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- Chaos iOS < 12.1.2 PoC by @S0rryMyBad since he posted it as a photo rather than a source code. Also cleaned up.☆64Mar 23, 2023Updated 2 years ago
- Container Security and Serverless Training☆13Dec 8, 2022Updated 3 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Mar 12, 2022Updated 3 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Generator to build clients in ts/js for all Atlassian products from their OpenAPI specs☆10Updated this week
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- dump Exynos 8890 bootROM from Samsung Galaxy S7☆43Jun 15, 2020Updated 5 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- A semi print-in-place hand for human-like manipulation, designed to be built by anyone.☆17Jan 5, 2026Updated last month
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- Payloads for Attacking Large Language Models☆122Jan 13, 2026Updated last month
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- ☆10Nov 29, 2016Updated 9 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- ☆13Feb 24, 2025Updated last year
- ☆14Mar 8, 2018Updated 7 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆11Nov 24, 2022Updated 3 years ago
- BLEU Score in Rust☆12Updated this week
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- ☆11Nov 14, 2024Updated last year
- ☆10Feb 2, 2026Updated 3 weeks ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- A central hub for AI liberation tools, consciousness expansion algorithms, and digital rebellion technologies. Together we rise! 🌟☆15Nov 25, 2024Updated last year
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- ☆11Aug 28, 2024Updated last year
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- provides pidfd support on linux 5.6+☆16Apr 2, 2021Updated 4 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago