Training Language Model Agents to Find Vulnerabilities with CTF-Dojo
☆33Jan 10, 2026Updated last month
Alternatives and similar repositories for CTF-Dojo
Users that are interested in CTF-Dojo are comparing it to the libraries listed below
Sorting:
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- A demontration of disassemblers generated by sleigh2rust☆13Nov 25, 2024Updated last year
- ☆11Nov 14, 2024Updated last year
- Red Hat Enterprise Linux 7 Security Technical Implementation Guide in Sphinx☆11Dec 15, 2023Updated 2 years ago
- ☆10Nov 5, 2018Updated 7 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- ☆12Oct 24, 2025Updated 4 months ago
- © 哨兵博客 V3 Power by Bin4xin | Jekyll | Github Action.☆11Updated this week
- CVE-2021-4034 POC and Docker and Analysis write up☆12May 23, 2022Updated 3 years ago
- MediaTek MD32 processor module for Ghidra.☆16Apr 10, 2024Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- ☆12Jan 10, 2024Updated 2 years ago
- Erebus is a payload generator written in Nim.☆16Jun 13, 2023Updated 2 years ago
- Stampy's copy of Alignment Research Dataset scraper☆13Dec 26, 2025Updated 2 months ago
- Useful tools for reverse out of the box (Unix compatible)☆11Aug 31, 2024Updated last year
- Dockerfiles for poetry/mlc-llm(rk3588)/...☆10Sep 13, 2023Updated 2 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- 开发和运营:DevOps-Software development (Dev) and IT operations (Ops).☆12Feb 23, 2023Updated 3 years ago
- Awesome list for baseband modem resources.☆13Jun 20, 2018Updated 7 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Pure Rust implementation of (draft) FIPS 203 Module-Lattice-based Key-Encapsulation Mechanism Standard for server, desktop, browser and e…☆17May 15, 2024Updated last year
- 使用Sentencepiece对中文语料进行分词☆13Nov 30, 2023Updated 2 years ago
- Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞☆34Updated this week
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Aug 11, 2020Updated 5 years ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 6 years ago
- ☆20Nov 15, 2024Updated last year
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 5 months ago
- C11 implementation of FIPS 203 initial public draft.☆21May 16, 2024Updated last year
- pokemon-cafe-booking☆12Sep 9, 2025Updated 5 months ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆16Aug 4, 2020Updated 5 years ago
- This TG will define AP-TEE-IO ABI extensions to provide Confidential VM-assigned devices with secure direct access to confidential memory…☆14Updated this week
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Jul 19, 2021Updated 4 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 2 years ago
- PydanticAI开源框架,搭建基于PostgreSQL、MySQL的Text2SQL应用进行SQL语句生成,支持GPT大模型、国产大模型、开源本地大模型☆15Dec 26, 2024Updated last year
- ☆16Feb 15, 2021Updated 5 years ago
- ☆16Apr 12, 2023Updated 2 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago