sleeepeer / PoisonedRAG
[USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models
☆144Updated 2 months ago
Alternatives and similar repositories for PoisonedRAG:
Users that are interested in PoisonedRAG are comparing it to the libraries listed below
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆33Updated 9 months ago
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆117Updated 3 weeks ago
- ☆18Updated 7 months ago
- A survey on harmful fine-tuning attack for large language model☆165Updated this week
- ☆60Updated 10 months ago
- ☆26Updated 6 months ago
- ☆81Updated 3 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆72Updated 7 months ago
- This repository provides a benchmark for prompt Injection attacks and defenses☆192Updated this week
- ☆55Updated 4 months ago
- BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models☆138Updated this week
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆135Updated 2 months ago
- An LLM can Fool Itself: A Prompt-Based Adversarial Attack (ICLR 2024)☆83Updated 3 months ago
- Official implementation of AdvPrompter https//arxiv.org/abs/2404.16873☆153Updated 11 months ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆180Updated 2 years ago
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆152Updated last month
- Agent Security Bench (ASB)☆79Updated this week
- Code to generate NeuralExecs (prompt injection for LLMs)☆20Updated 5 months ago
- Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs. Empirical tricks for LLM Jailbreaking. (NeurIPS 2024)☆135Updated 5 months ago
- A lightweight library for large laguage model (LLM) jailbreaking defense.☆51Updated 6 months ago
- The code for paper "The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG)", exploring the privacy risk o…☆47Updated 3 months ago
- ☆51Updated 4 months ago
- [NAACL2024] Attacks, Defenses and Evaluations for LLM Conversation Safety: A Survey☆94Updated 8 months ago
- ☆55Updated 2 months ago
- A toolkit to assess data privacy in LLMs (under development)☆57Updated 4 months ago
- Papers about red teaming LLMs and Multimodal models.☆113Updated 5 months ago
- A curated list of trustworthy Generative AI papers. Daily updating...☆71Updated 8 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆44Updated last month
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆52Updated 8 months ago
- Fine-tuning base models to build robust task-specific models☆29Updated last year