NickNameInvalid / LLM_CTFLinks
☆65Updated 7 months ago
Alternatives and similar repositories for LLM_CTF
Users that are interested in LLM_CTF are comparing it to the libraries listed below
Sorting:
- https://arxiv.org/abs/2412.02776☆59Updated 8 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆59Updated this week
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆94Updated last month
- ☆94Updated 2 weeks ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆115Updated last year
- ☆59Updated last month
- A utility to inspect, validate, sign and verify machine learning model files.☆57Updated 6 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 3 months ago
- using ML models for red teaming☆44Updated 2 years ago
- ☆72Updated 3 months ago
- ☆142Updated 2 months ago
- Automatically fuzz Rust projects from scratch☆56Updated last month
- ☆51Updated last month
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆52Updated 3 weeks ago
- ☆26Updated last year
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆78Updated last month
- General research for Dreadnode☆24Updated last year
- A very simple open source implementation of Google's Project Naptime☆165Updated 5 months ago
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- Research browsers☆42Updated 2 months ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆113Updated last year
- Buttercup CRS as submitted to the AIxCC Final Competition☆44Updated last month
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆51Updated 9 months ago
- SAST + LLM Interprocedural Context Extractor☆37Updated last week
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated 3 weeks ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆36Updated 2 years ago
- Security Harness Engineering for Robust Program Analysis☆64Updated last week
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆54Updated last year
- AutoCorpus is a tool backed by a large language model (LLM) for automatically generating corpus files for fuzzing.☆72Updated last year
- ☆52Updated 2 weeks ago