andreashappe / cochiseLinks
Autonomous Assumed Breach Penetration-Testing Active Directory Networks
☆18Updated this week
Alternatives and similar repositories for cochise
Users that are interested in cochise are comparing it to the libraries listed below
Sorting:
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆44Updated last month
- ☆53Updated last month
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆64Updated 2 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆116Updated last year
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆22Updated 5 months ago
- LLM Agent and Evaluation Framework for Autonomous Penetration Testing☆109Updated 5 months ago
- ☆35Updated 11 months ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆34Updated 2 weeks ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆25Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆12Updated 3 weeks ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- A collection of prompt injection mitigation techniques.☆23Updated last year
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆56Updated 3 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆117Updated 5 months ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆32Updated 7 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆109Updated last year
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆60Updated 6 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆33Updated this week
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆77Updated 2 months ago
- malicious PowerShell script detection model☆40Updated 3 years ago
- ☆40Updated 8 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆287Updated 9 months ago
- ☆51Updated 7 months ago
- ☆44Updated last month
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated last week
- some prompt about cyber security☆213Updated last year
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆46Updated 2 weeks ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆93Updated 10 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆181Updated 2 years ago