trailofbits / awesome-ml-securityLinks
☆148Updated last week
Alternatives and similar repositories for awesome-ml-security
Users that are interested in awesome-ml-security are comparing it to the libraries listed below
Sorting:
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆60Updated last week
- Payloads for Attacking Large Language Models☆99Updated 3 months ago
- Trail of Bits Testing Handbook☆79Updated last month
- Data Scientists Go To Jupyter☆66Updated 6 months ago
- A collection of prompt injection mitigation techniques.☆24Updated 2 years ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆64Updated last month
- A very simple open source implementation of Google's Project Naptime☆169Updated 5 months ago
- Dropbox LLM Security research code and results☆235Updated last year
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆114Updated last year
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆315Updated last year
- ☆48Updated last year
- ☆65Updated this week
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆105Updated last year
- CTF challenges designed and implemented in machine learning applications☆166Updated last year
- Security Harness Engineering for Robust Program Analysis☆83Updated 3 weeks ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆72Updated 2 weeks ago
- A collection of awesome resources related AI security☆301Updated last week
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆44Updated last week
- A benchmark for prompt injection detection systems.☆133Updated 2 weeks ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆51Updated 10 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆50Updated 10 months ago
- https://arxiv.org/abs/2412.02776☆62Updated 9 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆227Updated this week
- OWASP Machine Learning Security Top 10 Project☆90Updated 7 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- ☆80Updated 4 months ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆134Updated 3 months ago
- Code for the paper "Defeating Prompt Injections by Design"☆108Updated 2 months ago
- Code Hierarchy Exploration Net (chen)☆21Updated this week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year