trailofbits / awesome-ml-securityLinks
☆152Updated 2 months ago
Alternatives and similar repositories for awesome-ml-security
Users that are interested in awesome-ml-security are comparing it to the libraries listed below
Sorting:
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆60Updated last week
- Data Scientists Go To Jupyter☆67Updated 8 months ago
- Dropbox LLM Security research code and results☆243Updated last year
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆90Updated last month
- Payloads for Attacking Large Language Models☆104Updated 5 months ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆109Updated last year
- A collection of prompt injection mitigation techniques.☆24Updated 2 years ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆324Updated last year
- ☆65Updated 2 months ago
- Trail of Bits Testing Handbook☆82Updated last week
- ☆51Updated last year
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆73Updated last week
- A very simple open source implementation of Google's Project Naptime☆173Updated 7 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆52Updated last year
- https://arxiv.org/abs/2412.02776☆66Updated 11 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆73Updated last year
- Code for the paper "Defeating Prompt Injections by Design"☆146Updated 4 months ago
- Codebase of https://arxiv.org/abs/2410.14923☆52Updated last year
- Metis is an open-source, AI-driven tool for deep security code review☆83Updated last week
- OWASP Machine Learning Security Top 10 Project☆94Updated last month
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- CTF challenges designed and implemented in machine learning applications☆184Updated last month
- ATLAS tactics, techniques, and case studies data☆85Updated last week
- ☆75Updated last week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆165Updated 2 years ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆151Updated last month
- Code Hierarchy Exploration Net (chen)☆21Updated last week
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆58Updated 2 years ago
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆33Updated 9 months ago