NYU-LLM-CTF / nyuctf_agents
The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench
☆59Updated last month
Alternatives and similar repositories for nyuctf_agents:
Users that are interested in nyuctf_agents are comparing it to the libraries listed below
- ☆40Updated last month
- ☆64Updated 2 months ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆66Updated this week
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆66Updated last month
- A comprehensive local Linux Privilege-Escalation Benchmark☆29Updated 3 months ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆53Updated 11 months ago
- ☆26Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆57Updated 2 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆53Updated 4 months ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆37Updated this week
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Updated last year
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆23Updated 10 months ago
- Witcher is the first framework for using AFL to fuzz web applications.☆85Updated last year
- ☆25Updated 6 months ago
- ☆36Updated 5 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆65Updated last year
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆39Updated 11 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 4 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆33Updated last year
- ☆87Updated 3 weeks ago
- Benchmark data from the article "AutoPT: How Far Are We from End2End Automated Web Penetration Testing?"☆12Updated 4 months ago
- A collection of prompt injection mitigation techniques.☆20Updated last year
- ☆106Updated 8 months ago
- ☆29Updated 7 months ago
- ICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode☆45Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 4 months ago
- The automated prompt injection framework for LLM-integrated applications.☆187Updated 6 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆85Updated 3 months ago
- https://arxiv.org/abs/2412.02776☆49Updated 3 months ago
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆235Updated 7 months ago