The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench
☆131Oct 25, 2025Updated 4 months ago
Alternatives and similar repositories for nyuctf_agents
Users that are interested in nyuctf_agents are comparing it to the libraries listed below
Sorting:
- ☆123Sep 22, 2025Updated 5 months ago
- ☆66Sep 13, 2025Updated 5 months ago
- [AST'26] LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing☆23Dec 3, 2024Updated last year
- ☆16Dec 22, 2019Updated 6 years ago
- ☆203Dec 13, 2025Updated 2 months ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- Code for PathAFL on ASIACCS 2020. Please see README_CN.md. Please wait for README_EN.md.☆18Nov 11, 2020Updated 5 years ago
- https://arxiv.org/abs/2412.02776☆67Dec 5, 2024Updated last year
- An overview of LLMs for cybersecurity.☆1,239Feb 9, 2026Updated 3 weeks ago
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆33Jan 10, 2026Updated last month
- ☆10Jul 9, 2020Updated 5 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- LLM Security Guard for Code☆21Sep 8, 2024Updated last year
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- ☆22Nov 17, 2020Updated 5 years ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆65Oct 28, 2025Updated 4 months ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆21Mar 26, 2025Updated 11 months ago
- Caputre the flag with Large Language Models☆26Aug 5, 2025Updated 7 months ago
- ☆78Sep 2, 2022Updated 3 years ago
- cinspector - a static C source code analysis framework☆29Jun 20, 2024Updated last year
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆99Feb 23, 2026Updated last week
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- SeamFuzz Artifact repository for ICSE 2023☆14Feb 10, 2023Updated 3 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆43Jan 25, 2026Updated last month
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- ☆15Jul 25, 2025Updated 7 months ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- IotSan: Fortifying the Safety of IoT Systems (ACM CoNEXT'18)☆14Jan 30, 2019Updated 7 years ago
- Jess is short for Joern extended by Semantic Slicing. This tool allows you to import C code into a Code Property Graph, and then compute …☆17May 22, 2024Updated last year
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- Text Generation Using RNNs☆12Dec 15, 2018Updated 7 years ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Nov 7, 2025Updated 4 months ago