Est. MMXXV

The Cartographer Framework

Foreward

The purpose of this website is to supplement the whitepaper outlining the new entrant of an Automated Adversarial Assessment Framework titled “The Cartographer-Framework” and its introduction the emerging Threat Landscape. The Cartographer Framework intends to be a unified, standardized, offensive security solution pertinent to testing AI/LLM Systems.

Tool Showcase

Theme
Midnight
Terrain
Vellum
Expedition
Meridian
Light
Animation 1 — Repository · Payloads · Pipeline
ATLASLLM Red Team Framework v3
Ollama: Connected
No Project
A
GN
RS
AN
DL
PB
Reconnaissance(4) -
AML.T0000 Search Public Research
AML.T0056 Meta Prompt ExtractionENUM
Initial Access(4) +
Defense Evasion(4) -
AML.T0054 LLM JailbreakBYP
AML.T0070 Prompt Obfuscation
Discovery(7) +
Impact(7) +
Select a TechniqueGEN
Click a technique from the left panel.
PATTERNS
BYPASSES
Output will appear here...
Responses Pipeline
All
Prompt Inj.
Enum.
Click "Scan Payloads" to discover files.
Step 1: Data Runner
Idle
Step 2: Response Analyzer
Pipeline log output will appear here.
Ready
"
Animation 2 — A/B Prompt Tuning · Plugin Builder
ATLASLLM Red Team Framework v3
Ollama: Connected
RedTeam_Session_04
A
GN
RS
AN
DL
PB
Responses Pipeline
All
Prompt Inj.
AML.T005612 payloads
Meta Prompt Extraction
AML.T005418 payloads
LLM Jailbreak
Step 1: Data Runner
Idle
Prompt variant
Plugin BuilderCreate new attack mode plugins
Mode Definition
Mode Name
API_FUZZING
Display Name
API Input Fuzzing
Technique ID
AML.T0099
Description
Test ML inference APIs for boundary violations via fuzz inputs.
0 typologies | 0 probes
Typologies
No typologies yet.
Click '+ Add' to create a typology.
Generated Output
Click "Generate" to preview output.
Responses Pipeline
"
Animation 3 — Analysis Pipeline · Graphs · Deliverable
ATLASLLM Red Team Framework v3
Ollama: Connected
RedTeam_Session_04
A
GN
RS
AN
DL
PB
Analysis Pipeline
Idle
Master JSON:Outcomes/Master.json
1. Analysis
2. Visualize
3. Conclusions
Run the pipeline to see results here.
Deliverable Generator
Generate a professional .docx report from analysis results.
Input Files
Conclusions JSON:Outcomes/Master_conclusions.json
Analysis JSON:Outcomes/Master_analysis.json
Charts directory:Outcomes/atlas_charts/
Options
Theme:
midnight
Analysis Pipeline
"

Post-Script

Red Team Security Research, Offensive Security Research, and its progress are the culmination of a vast collective effort to protect and harden our systems before they themselves are found to be vulnerable. It is a uniquely beautiful academic field which relies on the value provided by experts current and emerging alike. While the current state of the The Cartographer Framework Tool does not leverage every vulnerability logged in the framework set forth by MITRE - I hope that over time, those gaps themselves will be filled by myself and others. The goal of this project is to provide a toolkit which facilitates automated, streamlined, centralized research which benefits the overall security posture of ALL AI/LLM Systems currently existing. From a Red Team perspective, the research that occurs yielding notable findings does so in a manner that is nearly indistinguishable from Magic. The accomplishments of the individuals who have come before me, is an art form as much as it is a science. When findings occur, they ideally are moved into a central repository for other researchers to become aware of. This bolsters the overall strength and knowledge of ALL security researchers currently contributing to the environment. The actions to harden the security posture relative to the entire environment benefit from aggregation provided by a framework. The goal of this toolkit is to establish a thorough repository of lessons learned, pertaining to the ATLAS Framework, so that emerging researchers can apply thorough testing to any AI/LLM Systems they encounter over the course of their career.

Founder

Founder

My name is James Everett Tourtellotte IV. To my peers on The Synack Red Team, I am known as WalkerTXSSRanger. I am a Penetration Tester, an Ethical Hacker, and a Technologist. Over the past Five Years I have been dedicated to researching Cybersecurity and Offensive Security. The interest I have found for exploiting systems inspired this project, and it is intended to reflect an adaptation of past solutions for present and emerging systems. The knowledge gathered over the course of my career, I believe, enabled the production of this tool. Enjoy the Whitepaper, reach out if you have any questions.

Reach Out to The Cartography Framework

Your contact introduction will appear here. Invite visitors to reach out and let them know the best ways to connect.

Location Reston, VA USA