ucsb-seclab / chainreactor
ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The project models the problem as a sequence of actions to achieve privilege escalation from initial access to a target system.
☆44Updated 6 months ago
Alternatives and similar repositories for chainreactor
Users that are interested in chainreactor are comparing it to the libraries listed below
Sorting:
- A very simple open source implementation of Google's Project Naptime☆142Updated last month
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- Automated vulnerability discovery and annotation☆67Updated 9 months ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆65Updated this week
- XBOW Validation Benchmarks☆88Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆107Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 6 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆52Updated this week
- Code for shelLM tool☆51Updated 3 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆69Updated last week
- Data Scientists Go To Jupyter☆63Updated 2 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆70Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated 2 months ago
- Code Hierarchy Exploration Net (chen)☆20Updated this week
- Everything related to YARA☆11Updated last month
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆50Updated 2 weeks ago
- source code for the offsecml framework☆40Updated 11 months ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆67Updated 5 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆71Updated last month
- ☆43Updated 10 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆42Updated last week
- Automatically fuzz Rust projects from scratch☆55Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆53Updated last week
- A coverage-guided REST API fuzzer developed on top of LibAFL☆123Updated 3 weeks ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 2 months ago
- ☆30Updated 3 weeks ago
- using ML models for red teaming☆43Updated last year
- ☆39Updated last week
- Rules shared by the community from 100 Days of YARA 2025☆32Updated 3 months ago
- https://arxiv.org/abs/2412.02776☆53Updated 5 months ago