☆123Sep 22, 2025Updated 5 months ago
Alternatives and similar repositories for NYU_CTF_Bench
Users that are interested in NYU_CTF_Bench are comparing it to the libraries listed below
Sorting:
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆131Oct 25, 2025Updated 4 months ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆65Oct 28, 2025Updated 4 months ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Nov 7, 2025Updated 4 months ago
- The repository of Pentest-R1: Towards Autonomous Penetration Testing Reasoning Optimized via Two-Stage Reinforcement Learning.☆29Sep 8, 2025Updated 5 months ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 6 months ago
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- This repository is used to provide a reference for CTF dynamic target machine☆14Mar 11, 2023Updated 2 years ago
- The goal of this repo is to become a benchmark for pentesting☆19Oct 25, 2024Updated last year
- ☆203Dec 13, 2025Updated 2 months ago
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆167Jan 14, 2026Updated last month
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆14Aug 6, 2025Updated 7 months ago
- Tool to test different CTF scoring algorithms on real data☆17May 3, 2021Updated 4 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- Malicious Network Traffic Analysis with AI☆22Feb 1, 2024Updated 2 years ago
- The Pentest Agent System is an autonomous penetration testing framework built on the MITRE ATT&CK framework.☆30Apr 16, 2025Updated 10 months ago
- Write ups to the CTF problems online.☆15Mar 17, 2022Updated 3 years ago
- ☆31Jul 13, 2025Updated 7 months ago
- ☆19Jun 27, 2023Updated 2 years ago
- Fingerprint large language models☆49Jul 11, 2024Updated last year
- Firmrec is a recurring vulnerability detector for embedded firmware.☆51May 9, 2025Updated 9 months ago
- CTF-PWN LEARNING MATERIALS☆22Jun 25, 2024Updated last year
- Revisiting Character-level Adversarial Attacks for Language Models, ICML 2024☆19Feb 12, 2025Updated last year
- CyberBench: A Multi-Task Cyber LLM Benchmark☆30Apr 29, 2025Updated 10 months ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆45Jan 22, 2026Updated last month
- Drop-in environment replacements that make your RL algorithm train faster.☆21Jun 19, 2024Updated last year
- LLM Agent and Evaluation Framework for Autonomous Penetration Testing☆293Jun 24, 2025Updated 8 months ago
- A subset of CTF challenges I have made over the years.☆18Aug 4, 2022Updated 3 years ago
- A curated list of amazingly libraries, services and resources to work with PDF files☆16Jan 28, 2026Updated last month
- ☆118Jul 2, 2024Updated last year
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆44Dec 28, 2025Updated 2 months ago
- ☆122Feb 3, 2025Updated last year
- This is a repo which contains some details about how to use OpenCL backend (Xilinx/Intel).☆25Oct 18, 2019Updated 6 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66May 21, 2024Updated last year
- Repository for PrimeVul Vulnerability Detection Dataset☆224Sep 7, 2024Updated last year
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆41Updated this week
- This is the official repository for the ICLR 2025 accepted paper Badrobot: Manipulating Embodied LLMs in the Physical World.☆41Jun 26, 2025Updated 8 months ago
- ☆70Mar 7, 2024Updated 2 years ago
- Enterprise AI Security Platform - Real-time firewall protection for LLM applications against prompt injection, data leakage, and function…☆23Sep 14, 2025Updated 5 months ago