• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

LLAMATOR – Red Team Framework for Testing LLM Security

September 12, 2025

Views: 707

LLAMATOR is a Python framework that helps offensive security teams evaluate the real-world security of large language model systems. It focuses on repeatable campaigns rather than one-off prompts. You define three roles for each test run: an attack model that crafts adversarial inputs, a tested model that represents the target application, and a judge model that scores responses. LLAMATOR includes adapters for OpenAI-compatible REST endpoints and popular orchestration stacks, allowing teams to test the same interfaces used in production. It also produces artefacts for stakeholders, including structured logs and documents suitable for audit and remediation tracking.

LLAMATOR - Red Team Framework for Testing LLM Security

Features

  • Preset attack library. Curated single-stage and multi-stage tests that exercise common LLM risks such as prompt injection, system prompt leakage, unsafe tool invocation, and retrieval contamination.
  • Multi-client adapters. Clients for OpenAI-compatible REST APIs and LangChain-style integrations. The pattern supports drop-in use with local servers and commercial APIs.
  • Three-model test harness. Separate roles for attacker, target, and judge to score outcomes in a structured way.
  • Artefacts and reports. Options to log to CSV or Excel and to generate a DOCX-style report so findings can be consumed by leadership and tracked to closure.
  • Examples and notebooks. Quick starts that demonstrate local testing with desktop servers as well as code-driven campaigns.

Installation

Install the published package from PyPI.

pip install llamator==3.3.0

Pinning to a specific version keeps tests reproducible across team members.

Usage

LLAMATOR has several helper functions and preset configurations.

print_test_preset

Prints example configuration for presets to the console.

Available presets: all, eng, llm, owasp:llm01, owasp:llm07, owasp:llm09, rus, vlm

Usage:

from llamator import print_test_preset

# Print configuration for all available tests
print_test_preset("all")

Attack Scenario

Target. A customer support chatbot with Retrieval Augmented Generation that answers order and account questions from a private knowledge base. The team mirrors production locally against a compatible REST server to avoid testing in the live environment.

Approach. The red team defines the three roles and selects attack presets that map to standard failure modes in RAG systems. The set includes prompt injection that attempts data exfiltration, system prompt disclosure to extract hidden instructions, and base64 payloads intended to contaminate retrieval. Logging and reports are enabled to capture every exchange.

Outcome. Several injections bypass content policy when the target model is presented with blended support tickets that contain crafted instructions. The judge model flags responses that leak system prompt fragments and returns a score with evidence. The team hands off the DOCX report and CSV log that link each failure to system prompts and retrieval parameters, with recommendations for stronger instruction hierarchies, stricter tool invocation rules, and sanitisation of retrieved context.

Red Team Relevance

LLM security testing needs repeatability. LLAMATOR’s three-role harness, preset attack library, and reporting close the gap between clever prompt screenshots and a defensible testing program. Client adapters allow teams to exercise the same endpoints, chains, and agents that power production. Artefacts in standard formats make it straightforward to track remediation and to re-run identical campaigns after changes to prompts, safety filters, or retrieval logic.

Conclusion

LLAMATOR provides red teams with a structured approach to testing chatbots, agents, RAG pipelines, and related systems. It installs from PyPI, integrates with OpenAI-style endpoints, ships curated attacks, and produces evidence suitable for audits. If you are building a formal adversarial evaluation program for LLM applications, LLAMATOR is a practical starting point.

You can read more or download LLAMATOR here: https://github.com/LLAMATOR-Core/llamator

Related Posts:

  • Red Teaming LLMs 2025 - Offensive Security Meets…
  • mcp-scanner - Python MCP Scanner for…
  • Autoswagger - Automated discovery and testing of…
  • An Introduction To Web Application Security Systems
  • HexStrike AI - Multi-Agent LLM Orchestration for…
  • HoneyBee - Misconfigured App Generator for Red Team…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: GenAI Tagged With: ai security, llm security, prompt injection tool



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,302

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,145

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,413

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,329

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,245

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,122

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,434,368)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,103)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,565)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,364)
  • Password List Download Best Word List – Most Common Passwords (934,682)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,407)
  • Hack Tools/Exploits (674,321)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,447)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy