Cyber-Zero: Training Cybersecurity Agents Without Runtime
☆71Feb 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for Cyber-Zero
Users that are interested in Cyber-Zero are comparing it to the libraries listed below
Sorting:
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- [ICML'24] TroVE: Inducing Verifiable and Efficient Toolboxes for Solving Programmatic Tasks☆32Sep 20, 2024Updated last year
- fast trainer for educational purposes☆23Updated this week
- SWE Arena☆35Jul 6, 2025Updated 7 months ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Sep 15, 2025Updated 5 months ago
- SCAM - Security Comprehension Awareness Measure | Open-source benchmark that tests AI agents' security awareness during realistic, multi-…☆82Feb 12, 2026Updated 2 weeks ago
- A pytorch implementation of Deep Functional Map (FMNet).☆15May 6, 2020Updated 5 years ago
- SAML Shield is an open-source Node.js library that proactively validates and rejects malicious SAML assertions at the protocol level, pro…☆54Feb 6, 2026Updated 3 weeks ago
- Crowdsourced fuzzing cluster. 🚀☆21Sep 15, 2021Updated 4 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated 11 months ago
- ☆20Apr 24, 2024Updated last year
- ☆54Aug 25, 2023Updated 2 years ago
- Real-Time learning "Living entity"☆54Jan 26, 2026Updated last month
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆33Feb 15, 2025Updated last year
- Apple Baseband Sourcecode☆29Sep 30, 2018Updated 7 years ago
- InstructCoder: Instruction Tuning Large Language Models for Code Editing | Oral ACL-2024 srw☆64Oct 4, 2024Updated last year
- Pseudo-code Instructions dataset☆27Dec 18, 2023Updated 2 years ago
- documentation used in my projects☆16Updated this week
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- ☆91Oct 23, 2025Updated 4 months ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Updated this week
- headless-ida-mcp-server☆30Apr 4, 2025Updated 10 months ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- Open-source customizable homelab dashboard☆100Feb 23, 2026Updated last week
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- A monitoring script for AFL☆41Feb 8, 2017Updated 9 years ago
- The repository of Pentest-R1: Towards Autonomous Penetration Testing Reasoning Optimized via Two-Stage Reinforcement Learning.☆27Sep 8, 2025Updated 5 months ago
- NAIJA OSINT INTEL is a comprehensive open-source intelligence gathering tool specifically designed for Nigerian cybersecurity professiona…☆19Aug 21, 2025Updated 6 months ago
- Real-Time equilibrium reconstruction code☆15Jan 29, 2026Updated last month
- CypherFlow.ai is a cutting-edge Open Source platform providing private, AI conversations powered by Bitcoin micropayments. Experience unc…☆19Aug 11, 2025Updated 6 months ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆24Feb 12, 2026Updated 2 weeks ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- ☆17Aug 5, 2025Updated 6 months ago
- ☆13Oct 11, 2024Updated last year
- ☆20Dec 24, 2025Updated 2 months ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago