A comprehensive local Linux Privilege-Escalation Benchmark
☆46Nov 7, 2025Updated 4 months ago
Alternatives and similar repositories for benchmark-privesc-linux
Users that are interested in benchmark-privesc-linux are comparing it to the libraries listed below
Sorting:
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Jul 27, 2023Updated 2 years ago
- Helping Ethical Hackers use LLMs in 50 Lines of Code or less..☆977Sep 4, 2025Updated 6 months ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆65Nov 19, 2025Updated 4 months ago
- [NAACL 2025] LLM-Supported Natural Language to Bash Translation☆16Jul 17, 2025Updated 8 months ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆42Mar 3, 2026Updated 2 weeks ago
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆71Oct 28, 2025Updated 4 months ago
- ☆126Sep 22, 2025Updated 6 months ago
- Collection of scripts to analyse the Linux kernel☆10Aug 25, 2019Updated 6 years ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- GDT (Ghidra Data Type) generated from IDA tils☆22Mar 10, 2023Updated 3 years ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Dec 14, 2025Updated 3 months ago
- The goal of this repo is to become a benchmark for pentesting☆22Oct 25, 2024Updated last year
- Repository for understanding and writing LLVM passes.☆35Jul 29, 2019Updated 6 years ago
- ☆12Mar 9, 2025Updated last year
- epub2sphinx is a tool to convert epub files to ReST for Sphinx☆11Apr 8, 2023Updated 2 years ago
- IEEE S&P 2023 - DEVFUZZ: Automatic Device Model-Guided Device Driver Fuzzing☆14Dec 16, 2024Updated last year
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 6 months ago
- Symbolic debugger☆29Feb 2, 2026Updated last month
- TelegramBot Handcrafted for Translation of places in OpenStreetMap☆12Mar 25, 2021Updated 4 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆17Jul 9, 2025Updated 8 months ago
- Code of "A Geometric Perspective on Variational Autoencoders" (NeurIPS 2022)☆15Nov 19, 2024Updated last year
- ☆15Jan 16, 2024Updated 2 years ago
- 健康码演示仅用自娱自乐,演示用途,请勿用于非法,违法,犯罪,后果自负,本软件不承担任何法律责任! 粤康码演示软件使用请点击: https://yuekma.github.io. 一.粤康码破解 三.辽事通破解 四.龙江健康码破解 五.山西省健康码破解 六.随申码破解 七.北…☆18Jun 24, 2022Updated 3 years ago
- ☆19Feb 22, 2022Updated 4 years ago
- ☆27Nov 30, 2024Updated last year
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 7 months ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆33Jan 19, 2026Updated 2 months ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- MIPS I simulator☆20Dec 28, 2018Updated 7 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- ☆13Feb 29, 2024Updated 2 years ago
- ☆30Jun 4, 2024Updated last year
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆137Oct 25, 2025Updated 4 months ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- OCaml hacking ideas, small and large.☆20Apr 9, 2024Updated last year
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- ☆43Jan 30, 2023Updated 3 years ago