ipa-lab / benchmark-privesc-linux
A comprehensive local Linux Privilege-Escalation Benchmark
☆29Updated 3 months ago
Alternatives and similar repositories for benchmark-privesc-linux:
Users that are interested in benchmark-privesc-linux are comparing it to the libraries listed below
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆59Updated last month
- ☆40Updated last month
- ☆26Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆37Updated this week
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆53Updated 11 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆33Updated last year
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆66Updated this week
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆53Updated 4 months ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆56Updated 4 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated 2 years ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆51Updated last week
- ☆64Updated 2 months ago
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆66Updated last month
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆94Updated 10 months ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆32Updated last month
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆39Updated 11 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 4 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆65Updated last year
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆23Updated 5 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- ☆26Updated last year
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆18Updated 6 months ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆44Updated this week
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆51Updated 2 months ago
- ☆87Updated 3 weeks ago
- Resources for our ICSE'24 poster: Prompt-Enhanced Software Vulnerability Detection Using ChatGPT.☆23Updated 10 months ago
- Practical Data-Only Attack Generation☆38Updated 9 months ago
- ☆124Updated 10 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de …☆67Updated 4 months ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆25Updated last year