Implementation of BEAST adversarial attack for language models (ICML 2024)
☆90May 14, 2024Updated last year
Alternatives and similar repositories for BEAST
Users that are interested in BEAST are comparing it to the libraries listed below
Sorting:
- ☆23Jan 17, 2025Updated last year
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆48Jul 24, 2024Updated last year
- ☆16May 30, 2024Updated last year
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆191Jun 26, 2025Updated 8 months ago
- [ECCV'24 Oral] The official GitHub page for ''Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking …☆35Oct 23, 2024Updated last year
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆69Oct 23, 2024Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆118Feb 7, 2024Updated 2 years ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆70Feb 22, 2024Updated 2 years ago
- ☆24Jun 17, 2025Updated 8 months ago
- TAP: An automated jailbreaking method for black-box LLMs☆221Dec 10, 2024Updated last year
- [NeurIPS 2024] Accelerating Greedy Coordinate Gradient and General Prompt Optimization via Probe Sampling☆34Nov 8, 2024Updated last year
- Improved Few-Shot Jailbreaking Can Circumvent Aligned Language Models and Their Defenses (NeurIPS 2024)☆65Jan 11, 2025Updated last year
- A fast + lightweight implementation of the GCG algorithm in PyTorch☆318May 13, 2025Updated 9 months ago
- AmpleGCG: Learning a Universal and Transferable Generator of Adversarial Attacks on Both Open and Closed LLM☆83Nov 3, 2024Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆57Aug 17, 2024Updated last year
- ☆59Jun 5, 2024Updated last year
- Official implementation of ICLR'24 paper, "Curiosity-driven Red Teaming for Large Language Models" (https://openreview.net/pdf?id=4KqkizX…☆88Mar 15, 2024Updated last year
- ☆60Mar 9, 2023Updated 2 years ago
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆23Jul 26, 2024Updated last year
- Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs. Empirical tricks for LLM Jailbreaking. (NeurIPS 2024)☆163Nov 30, 2024Updated last year
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Fluent student-teacher redteaming☆23Jul 25, 2024Updated last year
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- Example code for the NNGeometry PyTorch library☆10Aug 20, 2025Updated 6 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆56Mar 12, 2025Updated 11 months ago
- ☆50Aug 3, 2024Updated last year
- Adversarial Attacks on GPT-4 via Simple Random Search [Dec 2023]☆43Apr 28, 2024Updated last year
- ☆26Jun 5, 2024Updated last year
- [ICML 2024] Agent Smith: A Single Image Can Jailbreak One Million Multimodal LLM Agents Exponentially Fast☆118Mar 26, 2024Updated last year
- [ICML 2025] An official source code for paper "FlipAttack: Jailbreak LLMs via Flipping".☆165May 2, 2025Updated 10 months ago
- A curated collection of papers and related projects on using LLMs for privacy.☆25Oct 8, 2025Updated 4 months ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- ☆10Jul 28, 2022Updated 3 years ago
- A library for interacting with Windows through SMB written in Nim.☆16Sep 14, 2025Updated 5 months ago
- Universal and Transferable Attacks on Aligned Language Models☆4,521Aug 2, 2024Updated last year
- [ECCV 2024] Official PyTorch Implementation of "How Many Unicorns Are in This Image? A Safety Evaluation Benchmark for Vision LLMs"☆86Nov 28, 2023Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Official codebase for Image Hijacks: Adversarial Images can Control Generative Models at Runtime☆54Sep 19, 2023Updated 2 years ago