Skip to main content

A red-team AI security framework with adversarial attack modules

Project description

🛡️ AI Security Toolkit

Made by Rishit Goel 💻 Python License PyPI GitHub Repo stars GitHub last commit

A red-team framework for testing the vulnerabilities of AI models through adversarial attacks, privacy leakage, and model exploitation techniques — built and maintained by @rishit03.


🚀 Features

✅ 5+ attack modules
✅ Unified logging and visualization
✅ Command-line interface (interactive menu)
✅ Modular, reusable, and pip-installable
✅ Built using TensorFlow, CleverHans, and Python's best practices


📦 Modules Included

Module Name Description
🔓 Adversarial Attack (FGSM) Confuses the model with small pixel changes
💉 Label Flip Poisoning Modifies training labels to reduce model accuracy
🧠 Membership Inference Attack Infers if a data point was used in training
🪞 Model Inversion Reconstructs training images from the model
🧬 Model Stealing Clones the target model using black-box queries
🎯 Backdoor Trigger Attack Embeds a hidden trigger that forces misclassification

💻 CLI Usage

# After pip install or cloning locally
python ai_toolkit/run.py

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ai_security_toolkit-1.1.0.tar.gz (10.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ai_security_toolkit-1.1.0-py3-none-any.whl (14.8 kB view details)

Uploaded Python 3

File details

Details for the file ai_security_toolkit-1.1.0.tar.gz.

File metadata

  • Download URL: ai_security_toolkit-1.1.0.tar.gz
  • Upload date:
  • Size: 10.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.0.1 CPython/3.12.4

File hashes

Hashes for ai_security_toolkit-1.1.0.tar.gz
Algorithm Hash digest
SHA256 a729cdaaaee789f6c10cca4dcc40eedd9338080bfd7823eb392d8425dbf5b17a
MD5 ca502c2a43b140f5a70c0f5d33efbae8
BLAKE2b-256 aabd28cbf9a8fc15909fb61449f6aa0fbb82f1e718d4e95b24d8896efd395f28

See more details on using hashes here.

File details

Details for the file ai_security_toolkit-1.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for ai_security_toolkit-1.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 d6f8d2392e410ac43a72831de9af30aae5d68d714d4bec0d850d016eaddb557f
MD5 f40c9e5435699b8643a0c1979ff4cb32
BLAKE2b-256 c0066047d123cc6981800229488b7b75a3eb5ca2f929ad99affc5411493d2cf0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page