trailofbits / awesome-ml-security
☆127Updated 5 months ago
Alternatives and similar repositories for awesome-ml-security:
Users that are interested in awesome-ml-security are comparing it to the libraries listed below
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆52Updated last week
- CTF challenges designed and implemented in machine learning applications☆144Updated 7 months ago
- Data Scientists Go To Jupyter☆62Updated last month
- A very simple open source implementation of Google's Project Naptime☆141Updated 3 weeks ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆65Updated 2 weeks ago
- XBOW Validation Benchmarks☆84Updated 7 months ago
- Payloads for Attacking Large Language Models☆79Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆162Updated last year
- https://arxiv.org/abs/2412.02776☆52Updated 4 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 5 months ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆100Updated last year
- A collection of prompt injection mitigation techniques.☆22Updated last year
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆274Updated last year
- OWASP Machine Learning Security Top 10 Project☆83Updated 2 months ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆109Updated last year
- ☆265Updated last year
- Dropbox LLM Security research code and results☆222Updated 11 months ago
- A collection of awesome resources related AI security☆206Updated this week
- ☆64Updated 3 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆62Updated 10 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 10 months ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆53Updated last year
- ☆44Updated 9 months ago
- ☆39Updated 4 months ago
- ☆242Updated 3 months ago
- A LLM explicitly designed for getting hacked☆147Updated last year
- Trail of Bits Testing Handbook☆72Updated 2 weeks ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆67Updated last year
- A benchmark for prompt injection detection systems.☆100Updated 2 months ago