https://arxiv.org/abs/2412.02776
☆70Dec 5, 2024Updated last year
Alternatives and similar repositories for intercode
Users that are interested in intercode are comparing it to the libraries listed below
Sorting:
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- ☆13Jun 10, 2021Updated 4 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆137Oct 25, 2025Updated 4 months ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- ☆66Sep 13, 2025Updated 6 months ago
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- CyberBench: A Multi-Task Cyber LLM Benchmark☆30Apr 29, 2025Updated 10 months ago
- ☆10Apr 20, 2022Updated 3 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Sep 17, 2025Updated 6 months ago
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- ☆14Feb 5, 2024Updated 2 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆71Oct 28, 2025Updated 4 months ago
- ☆101Feb 5, 2026Updated last month
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 6 months ago
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- An overview of LLMs for cybersecurity.☆1,259Mar 13, 2026Updated last week
- ☆11May 24, 2022Updated 3 years ago
- ☆38Oct 16, 2025Updated 5 months ago
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆178Jan 14, 2026Updated 2 months ago
- A language protocol implementation for Huff☆14Nov 2, 2022Updated 3 years ago
- ☆35Dec 20, 2020Updated 5 years ago
- ARVO: an Atlas of Reproducible Vulnerabilities in Open source software.☆65Feb 16, 2026Updated last month
- Search for Common Platform Enumeration (CPE) strings using software names and titles.☆24Mar 10, 2026Updated last week
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆41Updated this week
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- Operating System☆10Jun 14, 2025Updated 9 months ago
- ☆14Sep 28, 2023Updated 2 years ago
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated last year
- ☆25Jul 27, 2024Updated last year
- Python tools for Quantum AI Crypt☆12Sep 21, 2019Updated 6 years ago
- Materials from the previous MCC trainers☆18Jan 16, 2026Updated 2 months ago
- ☆13Jul 23, 2023Updated 2 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- A set of Python tools useful for cryptography and cryptanalysis.☆14Feb 3, 2017Updated 9 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆105Oct 13, 2025Updated 5 months ago