trailofbits / awesome-ml-security
☆119Updated 3 months ago
Alternatives and similar repositories for awesome-ml-security:
Users that are interested in awesome-ml-security are comparing it to the libraries listed below
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆48Updated this week
- OWASP Machine Learning Security Top 10 Project☆81Updated last month
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 9 months ago
- A collection of awesome resources related AI security☆180Updated 3 weeks ago
- Data Scientists Go To Jupyter☆62Updated 3 months ago
- ☆199Updated last year
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆59Updated 8 months ago
- XBOW Validation Benchmarks☆72Updated 5 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆43Updated 3 months ago
- Payloads for Attacking Large Language Models☆75Updated 7 months ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆259Updated last year
- Dropbox LLM Security research code and results☆221Updated 9 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆44Updated 4 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆159Updated last year
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆98Updated 11 months ago
- ☆37Updated 2 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆51Updated this week
- A benchmark for prompt injection detection systems.☆96Updated 3 weeks ago
- Explore AI Supply Chain Risk with the AI Risk Database☆52Updated 9 months ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆56Updated last year
- CTF challenges designed and implemented in machine learning applications☆133Updated 6 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆100Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆208Updated 2 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆272Updated 6 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆178Updated this week
- Automatically fuzz Rust projects from scratch☆55Updated 9 months ago
- Supply chain security for ML☆131Updated this week
- ☆64Updated last month
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆18Updated 2 months ago
- A LLM explicitly designed for getting hacked☆139Updated last year