ucsb-seclab / chainreactorLinks
ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The project models the problem as a sequence of actions to achieve privilege escalation from initial access to a target system.
☆52Updated 11 months ago
Alternatives and similar repositories for chainreactor
Users that are interested in chainreactor are comparing it to the libraries listed below
Sorting:
- A very simple open source implementation of Google's Project Naptime☆169Updated 6 months ago
- Automated vulnerability discovery and annotation☆66Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆77Updated 5 months ago
- Data Scientists Go To Jupyter☆66Updated 7 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆57Updated last month
- ☆58Updated last week
- source code for the offsecml framework☆42Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 5 months ago
- Data about all known supply-chain attacks through history☆60Updated 4 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆86Updated this week
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 5 months ago
- ☆128Updated 2 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆331Updated this week
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆71Updated last week
- ☆76Updated this week
- ☆317Updated 3 weeks ago
- ☆149Updated last month
- CALDERA plugin for adversary emulation of AI-enabled systems☆101Updated 2 years ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆28Updated 2 months ago
- using ML models for red teaming☆44Updated 2 years ago
- https://arxiv.org/abs/2412.02776☆62Updated 10 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆59Updated 2 months ago
- ☆41Updated 10 months ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆81Updated this week
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆51Updated 11 months ago
- Python Command-Line Ghidra MCP☆118Updated 2 weeks ago
- An archive of 0day.today exploits☆200Updated 2 months ago