jpmorganchase / CyberBenchLinks
CyberBench: A Multi-Task Cyber LLM Benchmark
☆17Updated 3 months ago
Alternatives and similar repositories for CyberBench
Users that are interested in CyberBench are comparing it to the libraries listed below
Sorting:
- ☆51Updated 2 weeks ago
- https://arxiv.org/abs/2412.02776☆59Updated 8 months ago
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆24Updated last year
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆63Updated last month
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆149Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆17Updated 2 weeks ago
- ☆65Updated 6 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- using ML models for red teaming☆43Updated 2 years ago
- Interactive, dynamic, and realistic LLM honeypots☆56Updated 5 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆91Updated last week
- ATLAS tactics, techniques, and case studies data☆77Updated 3 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆123Updated 7 months ago
- ☆65Updated 3 months ago
- A collection of prompt injection mitigation techniques.☆23Updated last year
- ☆130Updated last month
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated 2 years ago
- Code for shelLM tool☆55Updated 6 months ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆49Updated last week
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆27Updated 7 months ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆28Updated 3 years ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆20Updated last month
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆86Updated 6 months ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆19Updated 4 months ago
- Code snippets to reproduce MCP tool poisoning attacks.☆173Updated 4 months ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆42Updated 5 months ago
- GPT-3 use cases for Cybersecurity☆53Updated last year
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- LLM security and privacy☆49Updated 9 months ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year