faizann24 / baby-naptimeLinks
A very simple open source implementation of Google's Project Naptime
☆184Updated 10 months ago
Alternatives and similar repositories for baby-naptime
Users that are interested in baby-naptime are comparing it to the libraries listed below
Sorting:
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆57Updated last year
- Automatic Exploit Generation with LLMs☆499Updated this week
- A growing collection of MCP servers bringing offensive security tools to AI assistants. Nmap, Ghidra, Nuclei, SQLMap, Hashcat and more.☆205Updated this week
- SAST + LLM Interprocedural Context Extractor☆176Updated 3 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- A modular framework for benchmarking LLMs and agentic strategies on security challenges across HackTheBox, TryHackMe, PortSwigger Labs, C…☆193Updated this week
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆97Updated 7 months ago
- https://arxiv.org/abs/2412.02776☆67Updated last year
- Metis is an open-source, AI-driven tool for deep security code review☆461Updated last week
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year
- ☆137Updated last week
- AI agent for autonomous cyber operations☆467Updated 2 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Updated last year
- Security Harness Engineering for Robust Program Analysis☆111Updated last week
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆342Updated last week
- ☆164Updated last week
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆117Updated last week
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆300Updated this week
- Data about all known supply-chain attacks through history☆63Updated 8 months ago
- Search engine for CTF writeups with instant results.☆152Updated 10 months ago
- ☆368Updated last month
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆84Updated this week
- Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents,…☆1,048Updated this week
- ☆187Updated last month
- ☆82Updated last month
- Autogrep automates Semgrep rule generation and filtering by using LLMs to analyze vulnerability patches, enabling automatic creation of h…☆72Updated 11 months ago
- AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with int…☆696Updated this week
- ☆363Updated 4 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆155Updated last year