theshi-1128 / ReDPJView external linksLinks
A novel jailbreak attack unveiling an overlooked attack surface inherently in the chain-of-thought reasoning trajectory of LLMs
☆22Sep 18, 2025Updated 4 months ago
Alternatives and similar repositories for ReDPJ
Users that are interested in ReDPJ are comparing it to the libraries listed below
Sorting:
- An easy-to-use Python framework to defend against jailbreak prompts.☆21Mar 22, 2025Updated 10 months ago
- MASTERKEY is a framework designed to explore and exploit vulnerabilities in large language model chatbots by automating jailbreak attacks…☆31Sep 12, 2024Updated last year
- The official implementation of our NAACL 2024 paper "A Wolf in Sheep’s Clothing: Generalized Nested Jailbreak Prompts can Fool Large Lang…☆152Sep 2, 2025Updated 5 months ago
- Test LLMs against jailbreaks and unprecedented harms☆40Oct 19, 2024Updated last year
- ☆164Sep 2, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 3 weeks ago
- [USENIX'25] HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns☆13Mar 1, 2025Updated 11 months ago
- ☆11Jul 10, 2024Updated last year
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆112Oct 11, 2024Updated last year
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- ☆13Dec 28, 2024Updated last year
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- A curated collection of papers and related projects on using LLMs for privacy.☆23Oct 8, 2025Updated 4 months ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- USBRelay Development libraries external usage☆11Mar 1, 2016Updated 9 years ago
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Dec 15, 2023Updated 2 years ago
- Julia rules for semgrep☆14Dec 9, 2025Updated 2 months ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- ☆14Oct 6, 2024Updated last year
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- Bithoven is a smart contract language for composing powerful and secure instruments on Bitcoin. LR(1) parser with static analysis for com…☆41Updated this week
- Build and publish Docker images, run builds/tasks within Docker containers or on remote hosts.☆16Updated this week
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Based on shawarkhanethicalhacker/BruteXSS☆15Jan 24, 2019Updated 7 years ago
- Type qualifiers for C☆16Sep 21, 2011Updated 14 years ago
- Code of paper: xJailbreak: Representation Space Guided Reinforcement Learning for Interpretable LLM Jailbreaking"☆17Mar 9, 2025Updated 11 months ago
- Detect the server side language used for the website☆13Mar 23, 2021Updated 4 years ago
- 📈 Stock screener and portfolio analyzer, providing key insights on financial reports, news articles and more!☆13Jun 24, 2019Updated 6 years ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆15Nov 3, 2017Updated 8 years ago
- A comprehensive tool for doing threat intelligence againts IP addresses to determine if it's are malicious☆29Dec 16, 2025Updated 2 months ago
- [COLING 2025] Official code of the paper "The Dark Side of Function Calling: Pathways to Jailbreaking Large Language Models"☆57Dec 26, 2024Updated last year
- ☆15Oct 8, 2025Updated 4 months ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year