amazon-science / CTF-DojoLinks
Training Language Model Agents to Find Vulnerabilities with CTF-Dojo
☆31Updated last month
Alternatives and similar repositories for CTF-Dojo
Users that are interested in CTF-Dojo are comparing it to the libraries listed below
Sorting:
- ☆238Updated last month
- LLM-powered system that discovered 62 zero-day vulnerabilities across 26 open source projects. 4th place, DARPA AIxCC.☆84Updated this week
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆66Updated 10 months ago
- ☆117Updated 4 months ago
- ☆171Updated 2 weeks ago
- Artifact for ICSE 2023☆50Updated 3 years ago
- Buttercup CRS as submitted to the AIxCC Final Competition☆95Updated 6 months ago
- ☆98Updated 4 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024☆80Updated 3 months ago
- Interactive, dynamic, and realistic LLM honeypots☆73Updated 11 months ago
- AutoSpear☆72Updated 2 years ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Updated 2 months ago
- XBOW Validation Benchmarks☆467Updated 7 months ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆37Updated this week
- ☆17Updated 6 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆41Updated 2 weeks ago
- PoC and Detection for CVE-2024-21626☆76Updated 2 years ago
- BHUSA'24: Cuda-pretrained Inference Decompile Agent (CuIDA)☆15Updated last year
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆122Updated 3 months ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆99Updated 9 months ago
- Cisco ASA Software and ASDM Security Research☆86Updated 3 years ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆49Updated 11 months ago
- ☆117Updated last year
- Source code for the DEF CON 30 CTF Finals.☆55Updated 3 years ago
- ☆29Updated last year
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Updated 3 years ago
- Source code for the DEF CON 31 CTF Qualifiers.☆127Updated 2 years ago
- ☆131Updated 5 months ago
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆18Updated last year