Welcome to GPTSecurity! This is a knowledge base focused on the intelligent revolution in the future security field!
GPTSecurity is a community that covers cutting-edge academic research and practical experience sharing, integrating knowledge of applications in security fields such as generating pre-trained Transformers (GPT), artificial intelligence generated content (AIGC), and large language models (LLM). Here, you can find the latest research papers, blog articles, practical tools and default instructions (Prompts) about GPT/AIGC/LLM.
GPTSecurity not only focuses on current technologies and trends, but also hopes to become a participant and promoter in shaping the intelligent revolution in the future security field. In this rapidly evolving field, we need to work together, embrace change, and continue to evolve to ensure that new technologies are better applied to security in the wave of artificial intelligence and machine learning. Our goal is to provide a convenient collaboration platform for practitioners, researchers and developers in the security field, where they can share experiences, exchange ideas and explore new possibilities.
Join the GPTSecurity community and let us work together to create an intelligent future in the security field!
Thank you very much for your attention and support to GPTSecurity! We eagerly await your contributions to jointly build this knowledge base focusing on the application of GPT, AIGC and LLM in the security field. Please refer to the following guidelines to ensure that your contribution is appropriate and facilitates discussion.
Choose the appropriate category
Before submitting a contribution, please make sure your content matches one of the following categories:
Research papers: Collect and organize the latest research papers on GPT, AIGC and LLM in the security field, including but not limited to software supply chain security, threat detection and other topics.
Blog article: collates the practical experience and sharing of experts and researchers using GPT, AIGC and LLM in the security field, including case analysis, technology evaluation, application prospects, etc.
Practical tools: Provide open source tools, plug-ins, libraries and other resources in the security field for GPT, AIGC and LLM to facilitate developers and researchers for practical operations.
Preset instructions (Prompts): Organize and share preset instructions applicable to GPT, AIGC and LLM for more effective training, inference and testing in the security field.
Keep your content high quality
We take the quality of our contributed content very seriously. Please make sure your submission has the following characteristics:
Accuracy: Information and data should be accurate and adhere to best practices and industry standards.
Readability: Articles and descriptions should be clear, easy to understand, and logical, avoiding the use of overly complex terminology and abbreviations.
Originality: Please ensure that the content you submit is original and has not been published elsewhere. If you cite the ideas or research of others, please indicate the source and follow appropriate citation conventions.
Contribution submission process
At GPTSecurity, we encourage community members to submit contributions in different ways to accommodate a variety of skills and needs. Here are three different contribution submission processes for you to choose from:
Submit using GitHub Issues: Contributors can initiate contributions through GitHub New Issues. Indicate "GPTSecurity Contribution" and the category (such as "Paper", "Article", "Tool" or "Instruction") and the name of the manuscript in the title. In the review content, provide author information (if there are multiple authors, please list all authors and their contact information), source address of the manuscript, introduction to the manuscript, and value to the GPTSecurity community. If there are relevant links or expansion resources, please provide them as well. After the Issue is submitted, we will reply to you as soon as possible to confirm receipt or provide suggestions for supplementary manuscripts.
Submit using GitHub Pull Requests (PR): Contributors can initiate resource merge requests through Github PR. Please provide a title and description for your Pull Request, detailing the changes you submitted. After the Pull Request is submitted, we will respond to you as soon as possible to confirm acceptance or provide additional relevant suggestions.
Submit using GitBook: We will invite core contributors to join our GitBook repository and maintain the knowledge base directly from the backend. If you are interested in this, please contribute through GitHub Issues or Pull Requests first, and we will invite you to join the GitBook repository based on your contribution.
We are grateful to Yunqi Wuyuan, the leader of the new generation of intelligent fuzz testing, for initiating and operating this project. We sincerely thank everyone who participates in and supports the development of GPTSecurity. It is because of your enthusiasm and selfless contribution that we have been able to build GPTSecurity into a knowledge base that brings together GPT, AIGC and LLM applications in the security field, and jointly promote the development of the intelligent revolution in the security field.
If there is any infringement, please contact us for deletion. If used for illegal purposes, you will be responsible for the consequences.
Welcome everyone to join the GPTSecurity WeChat community! Note: "GPTSecurity" has become friends with Yunqi Wuyun Xiaoyun. Here, we have gathered many experts, researchers and developers who are keen to explore the application of GPT, AIGC and LLM in the security field. We are deeply honored to work with you to create this vibrant and innovative community.