vinusankars / BEAST
Implementation of BEAST adversarial attack for language models (ICML 2024)
☆79Updated 8 months ago
Alternatives and similar repositories for BEAST:
Users that are interested in BEAST are comparing it to the libraries listed below
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆39Updated 3 months ago
- A collection of automated evaluators for assessing jailbreak attempts.☆102Updated this week
- This repository provides implementation to formalize and benchmark Prompt Injection attacks and defenses☆167Updated last week
- TAP: An automated jailbreaking method for black-box LLMs☆138Updated last month
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆47Updated 5 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated 9 months ago
- ☆47Updated 6 months ago
- ☆49Updated last month
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆90Updated this week
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆13Updated 6 months ago
- WMDP is a LLM proxy benchmark for hazardous knowledge in bio, cyber, and chemical security. We also release code for RMU, an unlearning m…☆95Updated 9 months ago
- An unofficial implementation of AutoDAN attack on LLMs (arXiv:2310.15140)☆32Updated 11 months ago
- ☆78Updated last year
- ☆30Updated 2 months ago
- Papers about red teaming LLMs and Multimodal models.☆91Updated 2 months ago
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆55Updated 9 months ago
- LLM security and privacy☆44Updated 3 months ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆66Updated 11 months ago
- ☆42Updated 8 months ago
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆79Updated this week
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆104Updated last month
- ☆9Updated last month
- Official implementation of AdvPrompter https//arxiv.org/abs/2404.16873☆134Updated 8 months ago
- Fine-tuning base models to build robust task-specific models☆27Updated 9 months ago
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆131Updated last month
- ☆31Updated 4 months ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆60Updated 4 months ago
- ☆44Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 8 months ago
- Agent Security Bench (ASB)☆56Updated last month