NYU-LLM-CTF / NYU_CTF_Bench
☆49Updated this week
Alternatives and similar repositories for NYU_CTF_Bench:
Users that are interested in NYU_CTF_Bench are comparing it to the libraries listed below
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆71Updated last month
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆42Updated last week
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆76Updated 3 weeks ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated this week
- A comprehensive local Linux Privilege-Escalation Benchmark☆32Updated 5 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆70Updated 3 months ago
- The automated prompt injection framework for LLM-integrated applications.☆202Updated 7 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 5 months ago
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆78Updated 3 months ago
- ☆26Updated 7 months ago
- TensorFlow API analysis tool and malicious model detection tool☆27Updated 2 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆42Updated last month
- Additional code and data for the automated malware generation paper☆12Updated last year
- ☆26Updated last year
- ☆16Updated 9 months ago
- A curated list of research resources in automated vulnerability detection (AVD)☆25Updated 5 months ago
- ☆39Updated 7 months ago
- Hey folks, this is a repository for papers on LLM for Vuln. Detection area☆44Updated last month
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆45Updated last month
- ☆111Updated 9 months ago
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆16Updated 2 months ago
- ☆64Updated 3 months ago
- Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models☆20Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆87Updated 3 weeks ago
- Resources for our ICSE'24 poster: Prompt-Enhanced Software Vulnerability Detection Using ChatGPT.☆24Updated last year
- ☆99Updated 2 months ago
- Witcher is the first framework for using AFL to fuzz web applications.☆87Updated last year
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆38Updated last year
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆40Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆67Updated last year