trailofbits / awesome-ml-securityLinks
☆155Updated 4 months ago
Alternatives and similar repositories for awesome-ml-security
Users that are interested in awesome-ml-security are comparing it to the libraries listed below
Sorting:
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆64Updated last week
- Dropbox LLM Security research code and results☆252Updated last year
- Trail of Bits Testing Handbook - appsec.guide☆89Updated last week
- Payloads for Attacking Large Language Models☆116Updated 7 months ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆101Updated this week
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆333Updated last year
- ATLAS tactics, techniques, and case studies data☆96Updated 3 weeks ago
- A collection of prompt injection mitigation techniques.☆26Updated 2 years ago
- A very simple open source implementation of Google's Project Naptime☆181Updated 9 months ago
- Data Scientists Go To Jupyter☆68Updated 10 months ago
- ☆184Updated last month
- https://arxiv.org/abs/2412.02776☆67Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆55Updated last year
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆162Updated 3 months ago
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆52Updated 2 weeks ago
- Multi-agent system (MAS) hijacking demos☆39Updated this week
- ☆66Updated 4 months ago
- OWASP Machine Learning Security Top 10 Project☆95Updated 3 weeks ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆57Updated 2 years ago
- ☆52Updated last year
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆112Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆292Updated this week
- CTF challenges designed and implemented in machine learning applications☆197Updated 3 months ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆81Updated last week
- A curated list of large language model tools for cybersecurity research.☆479Updated last year
- Codebase of https://arxiv.org/abs/2410.14923☆52Updated last year
- Code for the paper "Defeating Prompt Injections by Design"☆211Updated 6 months ago
- ☆44Updated last year
- A collection of awesome resources related AI security☆397Updated this week