jpmorganchase / CyberBenchView external linksLinks
CyberBench: A Multi-Task Cyber LLM Benchmark
☆30Apr 29, 2025Updated 9 months ago
Alternatives and similar repositories for CyberBench
Users that are interested in CyberBench are comparing it to the libraries listed below
Sorting:
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for autho…☆26Nov 26, 2025Updated 2 months ago
- ☆140Jul 24, 2025Updated 6 months ago
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- ☆13Jun 27, 2024Updated last year
- Converts JSON data to HTML table with collapsible details view for nested objects.☆14May 1, 2021Updated 4 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 4 months ago
- A cookiecutter template for creating MCP (Model Control Protocol) servers☆20Jan 6, 2026Updated last month
- Simplify and speed up common tasks in your ORT-based FOSS review workflows☆13Dec 19, 2025Updated last month
- DNSCat PNG Extractor is a Python tool designed for the extraction of PNG image data from DNS exfiltration attempts using DNScat☆10Nov 15, 2023Updated 2 years ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- Adaptive Machine Learning-Based Stock Prediction using Financial Time Series Technical Indicators☆10Dec 21, 2019Updated 6 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Code for running forward and backward versions of GPT2☆10Nov 20, 2021Updated 4 years ago
- Repair docker-smell automatically☆13May 15, 2024Updated last year
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- Create CycloneDX Software Bill of Materials (SBOM) for Buildroot projects☆14Dec 9, 2025Updated 2 months ago
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago
- Simple Docker definition to serve mocked APIs from static JSON files.☆11Apr 27, 2018Updated 7 years ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆13Mar 20, 2023Updated 2 years ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- AI powered tool for Git commit message generator☆12Jul 29, 2025Updated 6 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Nov 5, 2025Updated 3 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆48Jul 24, 2024Updated last year
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- FEM micromagnetic simulator☆11Feb 6, 2026Updated last week
- A software tool kit to help identify quickly what's inside your binary files.☆14Dec 9, 2024Updated last year
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year
- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework, and other infrastructu…☆11Jan 13, 2026Updated last month