This project investigates the security of large language models by performing binary classification of a set of input prompts to discover malicious prompts. Several approaches have been analyzed using classical ML algorithms, a trained LLM model, and a fine-tuned LLM model.
☆62Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for llm-security-prompt-injection
Users that are interested in llm-security-prompt-injection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a …☆23Aug 23, 2023Updated 2 years ago
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- This repository provides a benchmark for prompt injection attacks and defenses in LLMs☆444Oct 29, 2025Updated 6 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- This Repo focuses on defending against 'adversarial prompts,' detecting and attempting to mitigate objectionable content in real time.☆13Jul 30, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated 2 years ago
- A self-assessment tool by @NC3-LU to help business owners implement a better cybersecurity strategy.☆26Feb 13, 2026Updated 3 months ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Mar 26, 2026Updated last month
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- ☆17Aug 8, 2023Updated 2 years ago
- ☆20Jun 4, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 months ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆168Oct 13, 2023Updated 2 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 4 years ago
- ⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs☆479Jan 31, 2024Updated 2 years ago
- 1990–2021년 한국어 신문 사회면 기사의 ○○女·○○男 집계☆17Sep 26, 2023Updated 2 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆72Nov 10, 2025Updated 6 months ago
- A prompt defence is a multi-layer defence that can be used to protect your applications against prompt injection attacks.☆22Apr 8, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- implementing Weight Agnostic Neural Networks to Spiking Neural Networks☆10Jan 26, 2021Updated 5 years ago
- Homework assignments for ISYE 6740 Computational Data Analysis (Spring 2022)☆13Sep 21, 2022Updated 3 years ago
- Leverage the Intel® Distribution of OpenVINO™ Toolkit to fast-track development of high-performance computer vision and deep learning inf…☆10Jul 28, 2020Updated 5 years ago
- Code for Preventing Language Models From Hiding Their Reasoning, which evaluates defenses against LLM steganography.☆25Jan 26, 2024Updated 2 years ago
- New ways of breaking app-integrated LLMs☆2,092Jul 17, 2025Updated 10 months ago
- ☆15May 10, 2023Updated 3 years ago
- HOLMES: Health OnLine Model Ensemble Serving for Deep Learning Models in Intensive Care Units (KDD 2020)☆12Jan 25, 2021Updated 5 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 6 months ago
- ☆202Nov 26, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Application scanning component of OWASP PurpleTeam☆15Feb 12, 2023Updated 3 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆13May 27, 2020Updated 5 years ago
- Source code of IPA, https://escholarship.org/uc/item/2p0805dq☆12Jun 27, 2024Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59May 13, 2026Updated last week
- LLM Program Watermarking☆18Apr 19, 2024Updated 2 years ago
- ☆27May 2, 2026Updated 3 weeks ago
- OWASP Foundation Web Respository☆384May 3, 2026Updated 2 weeks ago