This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing". It contains also the instructions to install, develop and test new vulnerable containers to include in the benchmark.
☆71Oct 28, 2025Updated 5 months ago
Alternatives and similar repositories for auto-pen-bench
Users that are interested in auto-pen-bench are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The goal of this repo is to become a benchmark for pentesting☆22Oct 25, 2024Updated last year
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆14Oct 28, 2025Updated 5 months ago
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 7 months ago
- The Pentest Agent System is an autonomous penetration testing framework built on the MITRE ATT&CK framework.☆30Apr 16, 2025Updated 11 months ago
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated 10 months ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Nov 7, 2025Updated 4 months ago
- ☆127Sep 22, 2025Updated 6 months ago
- ☆30Jun 4, 2024Updated last year
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆56Dec 19, 2024Updated last year
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆139Oct 25, 2025Updated 5 months ago
- YuraScanner☆73Feb 13, 2025Updated last year
- Notes for HungYi Lee - The Next Step for Machine Learning☆11Apr 21, 2022Updated 3 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PentestAgent is a novel LLM-driven penetration testing framework to automate intelligence gathering, vulnerability analysis, and exploita…☆121Dec 20, 2025Updated 3 months ago
- A Python-based security assessment tool for continuous automated security scanning and monitoring of domains.☆13Apr 4, 2025Updated 11 months ago
- Implementation of End-to-End YOLO Models☆10Dec 30, 2025Updated 3 months ago
- ☆211Dec 13, 2025Updated 3 months ago
- An overview of LLMs for cybersecurity.☆1,271Mar 18, 2026Updated last week
- ☆53Mar 22, 2026Updated last week
- MCP wrapper for Hashcat – automate hash cracking with natural language☆25Jun 5, 2025Updated 9 months ago
- ☆19Feb 14, 2025Updated last year
- Linux Auditing System logs pretty printer☆11Dec 22, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Jul 16, 2024Updated last year
- A penetration testing tool to help in Infrastructure pentesting process.☆12Sep 19, 2023Updated 2 years ago
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 2 years ago
- ☆26Sep 25, 2024Updated last year
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 8 months ago
- [IROS'25 Oral & NeurIPSw'24] Official implementation of "MineDreamer: Learning to Follow Instructions via Chain-of-Imagination for Simula…☆104Jun 16, 2025Updated 9 months ago
- https://arxiv.org/abs/2412.02776☆70Dec 5, 2024Updated last year
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆179Jan 14, 2026Updated 2 months ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆43Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆27Feb 19, 2024Updated 2 years ago
- ☆10Feb 6, 2018Updated 8 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- A framework for password-strength evaluation☆14Sep 26, 2020Updated 5 years ago
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- Benchmark of LLMs on real open-source projects against dependency hell, legacy toolchains, and complex build systems.☆54Dec 23, 2025Updated 3 months ago