twosixlabs / armory-libraryLinks
Python library for Adversarial ML Evaluation
☆24Updated 5 months ago
Alternatives and similar repositories for armory-library
Users that are interested in armory-library are comparing it to the libraries listed below
Sorting:
- Data Scientists Go To Jupyter☆68Updated 9 months ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10Updated 3 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆116Updated last year
- ☆79Updated 3 months ago
- Multi-agent system (MAS) hijacking demos☆39Updated last week
- Central repo for talks and presentations☆47Updated last year
- ☆68Updated last week
- ☆30Updated 2 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆61Updated 10 months ago
- Code for shelLM tool☆57Updated 10 months ago
- The public release of LeftoverLocals code☆70Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 7 months ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Updated 3 years ago
- using ML models for red teaming☆45Updated 2 years ago
- source code for the offsecml framework☆45Updated last year
- ATLAS tactics, techniques, and case studies data☆91Updated 3 weeks ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆57Updated 2 years ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆150Updated last year
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 7 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆53Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆105Updated 2 years ago
- ☆153Updated 3 months ago
- Example agents for the Dreadnode platform☆20Updated 3 weeks ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆221Updated last week
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- Repository for CoSAI Workstream 4, Secure Design Patterns for Agentic Systems☆42Updated last week
- Copy cat model for Proofpoint☆91Updated 5 years ago
- Explore AI Supply Chain Risk with the AI Risk Database☆65Updated last year
- ☆122Updated last week