vinusankars / BEASTLinks
Implementation of BEAST adversarial attack for language models (ICML 2024)
☆92Updated last year
Alternatives and similar repositories for BEAST
Users that are interested in BEAST are comparing it to the libraries listed below
Sorting:
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆177Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆57Updated last year
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆68Updated last year
- Papers about red teaming LLMs and Multimodal models.☆159Updated 7 months ago
- TAP: An automated jailbreaking method for black-box LLMs☆217Updated last year
- General research for Dreadnode☆27Updated last year
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆183Updated 9 months ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆21Updated last year
- ☆112Updated last month
- ☆75Updated last year
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆98Updated last year
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆70Updated last year
- Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks [ICLR 2025]☆377Updated last year
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆105Updated last year
- This repository provides a benchmark for prompt injection attacks and defenses in LLMs☆380Updated 2 months ago
- WMDP is a LLM proxy benchmark for hazardous knowledge in bio, cyber, and chemical security. We also release code for RMU, an unlearning m…☆157Updated 7 months ago
- ☆110Updated last year
- A re-implementation of the "Red Teaming Language Models with Language Models" paper by Perez et al., 2022☆35Updated 2 years ago
- ☆121Updated 6 months ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆66Updated last year
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆190Updated 9 months ago
- An unofficial implementation of AutoDAN attack on LLMs (arXiv:2310.15140)☆45Updated last year
- ☆192Updated 2 years ago
- ☆98Updated 2 years ago
- Code to conduct an embedding attack on LLMs☆30Updated last year
- Official implementation of AdvPrompter https//arxiv.org/abs/2404.16873☆174Updated last year
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆64Updated 2 months ago
- Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs. Empirical tricks for LLM Jailbreaking. (NeurIPS 2024)☆160Updated last year
- LLM security and privacy☆53Updated last year
- JailbreakBench: An Open Robustness Benchmark for Jailbreaking Language Models [NeurIPS 2024 Datasets and Benchmarks Track]☆517Updated 9 months ago