an overview of the current attack techniques on LLMs by Marcello Carboni
Cross-referenced across 55 tracked directories
#96343
Popularity Rank
1 / 55
Listed In
Emerging
Adoption Stage
3/13/2026
First Seen
Recently added to the ecosystem
From Prompt Injection to C2 with Claude Computer Use
the Open Worldwide Application Security Project's list related to LLMs [[Youtube video]](https://www.youtube.com/watch?v=engR9tYSsug)
...moreLLM security and privacy
knowledge base of adversary tactics and techniques based on real-world attack observations and realistic demonstrations from AI red teams and security groups, modeled after the MITRE ATT&CK® framework.
...more