jpmorganchase / CyberBench
CyberBench: A Multi-Task Cyber LLM Benchmark
☆14Updated last week
Alternatives and similar repositories for CyberBench:
Users that are interested in CyberBench are comparing it to the libraries listed below
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆42Updated 2 months ago
- General research for Dreadnode☆21Updated 10 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆106Updated 4 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆41Updated 2 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆65Updated 2 weeks ago
- A collection of prompt injection mitigation techniques.☆22Updated last year
- ☆29Updated 3 weeks ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆32Updated 4 months ago
- ☆64Updated 3 months ago
- ATLAS tactics, techniques, and case studies data☆64Updated this week
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆44Updated last week
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆21Updated 4 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆103Updated 11 months ago
- https://arxiv.org/abs/2412.02776☆52Updated 4 months ago
- ☆13Updated 4 months ago
- This is the official repository for the code used in the paper: "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants", USEN…☆48Updated 2 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 5 months ago
- Code for shelLM tool☆51Updated 2 months ago
- AI-powered tool designed to help security professionals detect vulnerabilities at machine speed and extract insights from extensive bug b…☆16Updated 8 months ago
- Book Introduction Page☆16Updated last year
- ☆13Updated 2 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆59Updated 5 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- ☆48Updated 2 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated last month
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 5 months ago
- using ML models for red teaming☆43Updated last year
- ☆40Updated 2 months ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆67Updated 4 months ago