timothee-chauvin / eyeballvulLinks
future-proof vulnerability detection benchmark, based on CVEs in open-source repos
☆56Updated last week
Alternatives and similar repositories for eyeballvul
Users that are interested in eyeballvul are comparing it to the libraries listed below
Sorting:
- CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities☆61Updated last week
- ☆65Updated 5 months ago
- ☆116Updated 2 weeks ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆30Updated this week
- ☆26Updated last year
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆40Updated 2 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆72Updated last year
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆81Updated 2 months ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- ☆135Updated last month
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆51Updated 3 months ago
- ☆26Updated last year
- ☆55Updated last month
- A collection of prompt injection mitigation techniques.☆22Updated last year
- https://arxiv.org/abs/2412.02776☆57Updated 6 months ago
- A very simple open source implementation of Google's Project Naptime☆155Updated 3 months ago
- Data Scientists Go To Jupyter☆63Updated 3 months ago
- XBOW Validation Benchmarks☆104Updated last week
- Testability Pattern Catalogs for SAST☆31Updated 4 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- using ML models for red teaming☆43Updated last year
- ☆45Updated 11 months ago
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆188Updated last week
- ☆116Updated 11 months ago
- ☆42Updated 8 months ago
- ☆44Updated 8 months ago
- YuraScanner☆44Updated 4 months ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆53Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆35Updated last year