wearetyomsmnv / Awesome-LLM-agent-SecurityView external linksLinks
All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.
☆40Dec 28, 2025Updated last month
Alternatives and similar repositories for Awesome-LLM-agent-Security
Users that are interested in Awesome-LLM-agent-Security are comparing it to the libraries listed below
Sorting:
- ☆17Sep 4, 2024Updated last year
- ☆10Dec 30, 2020Updated 5 years ago
- ☆52Jan 28, 2026Updated 2 weeks ago
- ☆12Aug 4, 2018Updated 7 years ago
- Official PyTorch Implementation of Federated Learning with Positive and Unlabeled Data☆10Aug 12, 2022Updated 3 years ago
- ☆12Dec 22, 2025Updated last month
- Analyze and cure awesome lists by collecting, processing and presenting data from listed Git projects.☆19Oct 12, 2025Updated 4 months ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Documents, Data, and Code. The NCX Methodology For Improved Forest Management (IFM) Through Short-Term Harvest Deferral.☆11Apr 25, 2023Updated 2 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 10 months ago
- ☆14Nov 9, 2023Updated 2 years ago
- Cryptographically Secure Aggregation for Federated Learning☆11Jan 24, 2023Updated 3 years ago
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 6 months ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Aug 27, 2022Updated 3 years ago
- Collection of various tools to analyze and reverse engineer checksums in short data packets.☆11Jun 12, 2025Updated 8 months ago
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- Open Data Product Specification 3.0☆10Nov 28, 2024Updated last year
- LLM Security Guard for Code☆20Sep 8, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- NVS Partition Generator tool☆11May 8, 2025Updated 9 months ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- 🛡️ CyberORDA: Энциклопедия безопасной разработки. Учитесь, делитесь знаниями и делайте AppSec Great Again вместе! ✍️🔒☆52Oct 11, 2025Updated 4 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- Build a Streamlit app with LangChain and Amazon Bedrock - Use ElastiCache Serverless Redis for chat history, deploy to EKS and manage per…☆14Jan 12, 2024Updated 2 years ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- Transparent Reporting of Ethics for Generative AI (TREGAI) Checklist☆15Oct 16, 2024Updated last year
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- ☆10Apr 1, 2025Updated 10 months ago
- Convert midi into fmf☆13Nov 4, 2022Updated 3 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- ☆29Jul 2, 2025Updated 7 months ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Theme for Discord☆15Feb 3, 2026Updated 2 weeks ago
- ☆12Jun 15, 2024Updated last year
- Scan A2A agents for potential threats and security issues☆113Jan 13, 2026Updated last month
- Useful windows tools for Blue, Red & Purple teams☆11Updated this week
- Develop Android apps with MoonScript and LuaJ☆10Apr 6, 2016Updated 9 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Sep 12, 2018Updated 7 years ago