twosixlabs / armory-libraryLinks
Python library for Adversarial ML Evaluation
☆15Updated 5 months ago
Alternatives and similar repositories for armory-library
Users that are interested in armory-library are comparing it to the libraries listed below
Sorting:
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆110Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆210Updated 5 months ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆56Updated last year
- ☆34Updated 6 months ago
- ☆109Updated 2 weeks ago
- A toolkit for detecting and protecting against vulnerabilities in Large Language Models (LLMs).☆138Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 3 weeks ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆181Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆57Updated 4 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆126Updated last week
- Data Scientists Go To Jupyter☆64Updated 3 months ago
- ☆134Updated 3 weeks ago
- A Python library for Secure and Explainable Machine Learning☆177Updated 4 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆58Updated last year
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆46Updated 2 weeks ago
- ☆65Updated 4 months ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆25Updated last year
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆66Updated 4 years ago
- ATLAS tactics, techniques, and case studies data☆73Updated last month
- A JupyterLab extension to evaluate the security of your Jupyter environment☆39Updated last year
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆77Updated 2 months ago
- Code to break Llama Guard☆31Updated last year
- A benchmark for prompt injection detection systems.☆115Updated 3 weeks ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆10Updated 3 years ago
- ☆30Updated this week
- Code used to run the platform for the LLM CTF colocated with SaTML 2024☆26Updated last year
- Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natura…☆37Updated last year