A novel jailbreak attack unveiling an overlooked attack surface inherently in the chain-of-thought reasoning trajectory of LLMs
☆22Sep 18, 2025Updated 5 months ago
Alternatives and similar repositories for ReDPJ
Users that are interested in ReDPJ are comparing it to the libraries listed below
Sorting:
- A gdb for fuzzing☆22Nov 26, 2021Updated 4 years ago
- MASTERKEY is a framework designed to explore and exploit vulnerabilities in large language model chatbots by automating jailbreak attacks…☆33Sep 12, 2024Updated last year
- Test LLMs against jailbreaks and unprecedented harms☆40Oct 19, 2024Updated last year
- ☆164Sep 2, 2024Updated last year
- ☆11Jul 10, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- Code for running forward and backward versions of GPT2☆10Nov 20, 2021Updated 4 years ago
- ☆13Dec 28, 2024Updated last year
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Talk to your shell in natural language. Locally.☆55Feb 15, 2026Updated 3 weeks ago
- Bithoven is a smart contract language for composing powerful and secure instruments on Bitcoin. LR(1) parser with static analysis for com…☆41Feb 25, 2026Updated last week
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 3 months ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Build and publish Docker images, run builds/tasks within Docker containers or on remote hosts.☆16Mar 2, 2026Updated last week
- Julia rules for semgrep☆14Dec 9, 2025Updated 3 months ago
- A curated collection of papers and related projects on using LLMs for privacy.☆25Oct 8, 2025Updated 5 months ago
- Code for Neurips 2024 paper "Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models"☆59Jan 15, 2025Updated last year
- Detect the server side language used for the website☆13Mar 23, 2021Updated 4 years ago
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- 📈 Stock screener and portfolio analyzer, providing key insights on financial reports, news articles and more!☆13Jun 24, 2019Updated 6 years ago
- Type qualifiers for C☆16Sep 21, 2011Updated 14 years ago
- Simple TR64 UPnP: A simple way to talk to your UPnP and/or TR64 protocol devices☆11Mar 13, 2021Updated 4 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- [COLING 2025] Official code of the paper "The Dark Side of Function Calling: Pathways to Jailbreaking Large Language Models"☆58Dec 26, 2024Updated last year
- CVE-2025-24203漏洞☆22May 25, 2025Updated 9 months ago
- Pelican plugin for embedding Javascript/CSS into individual articles☆17Jul 6, 2020Updated 5 years ago
- Collection of dynamic security related helpers☆16Dec 9, 2022Updated 3 years ago