zmre / awesome-security-for-ai
Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.
☆62Updated 11 months ago
Alternatives and similar repositories for awesome-security-for-ai
Users that are interested in awesome-security-for-ai are comparing it to the libraries listed below
Sorting:
- source code for the offsecml framework☆40Updated 11 months ago
- ☆36Updated 4 months ago
- Reference notes for Attacking and Defending Generative AI presentation☆61Updated 9 months ago
- LLM Testing Findings Templates☆72Updated last year
- ☆39Updated last week
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆71Updated 2 weeks ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆109Updated 4 months ago
- ☆40Updated last week
- A LLM explicitly designed for getting hacked☆149Updated last year
- ☆130Updated this week
- Payloads for Attacking Large Language Models☆83Updated 10 months ago
- ☆73Updated 2 weeks ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆161Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆26Updated 4 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆108Updated last year
- ☆21Updated 3 weeks ago
- ☆243Updated 4 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 7 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated last week
- A very simple open source implementation of Google's Project Naptime☆142Updated last month
- NOVA: The Prompt Pattern Matching☆80Updated 2 weeks ago
- ATLAS tactics, techniques, and case studies data☆71Updated 3 weeks ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆110Updated 7 months ago
- A research project to add some brrrrrr to Burp☆165Updated 3 months ago
- An example vulnerable app that integrates an LLM☆20Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 6 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 6 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- using ML models for red teaming☆43Updated last year