xsankar / AI-Red-TeamingLinks
All things specific to LLM Red Teaming Generative AI
☆29Updated last year
Alternatives and similar repositories for AI-Red-Teaming
Users that are interested in AI-Red-Teaming are comparing it to the libraries listed below
Sorting:
- Payloads for Attacking Large Language Models☆104Updated 4 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆142Updated 10 months ago
- using ML models for red teaming☆44Updated 2 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- source code for the offsecml framework☆42Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆87Updated this week
- LLM | Security | Operations in one github repo with good links and pictures.☆63Updated 10 months ago
- https://arxiv.org/abs/2412.02776☆64Updated 10 months ago
- Data Scientists Go To Jupyter☆67Updated 7 months ago
- ☆59Updated this week
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 8 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆73Updated last year
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆27Updated last year
- ☆91Updated last week
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆26Updated this week
- Reference notes for Attacking and Defending Generative AI presentation☆67Updated last year
- Example agents for the Dreadnode platform☆18Updated this week
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆64Updated 6 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 5 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- A collection of prompt injection mitigation techniques.☆24Updated 2 years ago
- ☆77Updated 3 months ago
- ATLAS tactics, techniques, and case studies data☆85Updated 2 weeks ago
- ☆17Updated 6 months ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆12Updated 3 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆140Updated this week
- Curated resources, research, and tools for securing AI systems☆156Updated last week
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆145Updated 3 weeks ago
- A curated list of awesome AI Red Teaming resources and tools.☆26Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 8 months ago