CS-Eval is a comprehensive evaluation suite for fundamental cybersecurity models or large language models' cybersecurity ability.
☆60Nov 27, 2024Updated last year
Alternatives and similar repositories for CS-Eval
Users that are interested in CS-Eval are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CyberMetric dataset☆116Jan 1, 2025Updated last year
- Metis: Understanding and Enhancing Regular Expressions in Network☆14Aug 19, 2022Updated 3 years ago
- [NAACL 2024 Findings] Deja vu: Contrastive Historical Modeling with Prefix-tuning for Temporal Knowledge Graph Reasoning☆15Jul 8, 2024Updated last year
- LLM agent to automatically set up arbitrary projects and run their test suites☆61Jan 19, 2026Updated 2 months ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ☆57Oct 4, 2024Updated last year
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆40Aug 12, 2025Updated 7 months ago
- ☆11Oct 13, 2020Updated 5 years ago
- ☆117Apr 3, 2024Updated last year
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- Extract HP printer ".bdl" firmware update files☆12Nov 15, 2017Updated 8 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- ☆80Feb 11, 2026Updated last month
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- ☆17Jan 28, 2026Updated last month
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 4 months ago
- ☆206Dec 13, 2025Updated 3 months ago
- A tool that allows you to document and assess any security automation in your SOC☆49Oct 31, 2024Updated last year
- A Python Implementation of XQ Message SDK (V.2) which provides convenient access to the XQ Message API.☆11Feb 18, 2026Updated last month
- A command-line utility for working with URLs.☆10Dec 8, 2025Updated 3 months ago
- A Selenium scraper for public domain search tools.☆18Oct 27, 2024Updated last year
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆66Nov 16, 2022Updated 3 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- xAST评价体系,让安全工具不再“黑盒”. The xAST evaluation benchmark makes security tools no longer a "black box".☆467Jan 15, 2026Updated 2 months ago
- 2016豆瓣热门电影, 用户评分数据集, 协同过滤推荐☆11Aug 21, 2016Updated 9 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆137Oct 25, 2025Updated 4 months ago
- ☆327Jul 25, 2024Updated last year
- Jess is short for Joern extended by Semantic Slicing. This tool allows you to import C code into a Code Property Graph, and then compute …☆17May 22, 2024Updated last year
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆36Jan 10, 2026Updated 2 months ago
- Use black or white list to check if 3rd app have the permission to start the protected Activity☆14Mar 6, 2018Updated 8 years ago
- ☆21Mar 18, 2025Updated last year
- ☆13Jan 24, 2022Updated 4 years ago
- 面向项目版本差异性的漏洞识别技术研究☆14Mar 29, 2022Updated 3 years ago
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆49Updated this week
- Simple WireGuard interface monitoring☆13Mar 9, 2026Updated 2 weeks ago