xashru / cti-benchLinks
☆79Updated last month
Alternatives and similar repositories for cti-bench
Users that are interested in cti-bench are comparing it to the libraries listed below
Sorting:
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Updated last year
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆101Updated 2 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆51Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆109Updated last year
- ATLAS tactics, techniques, and case studies data☆93Updated last week
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆15Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆232Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆91Updated last week
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆65Updated 6 months ago
- ☆182Updated 2 weeks ago
- Curated resources, research, and tools for securing AI systems☆288Updated 2 weeks ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆28Updated 8 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆204Updated 2 years ago
- Code for shelLM tool☆57Updated 11 months ago
- A collection of prompt injection mitigation techniques.☆25Updated 2 years ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆158Updated 2 months ago
- A very simple open source implementation of Google's Project Naptime☆179Updated 9 months ago
- A benchmark for prompt injection detection systems.☆153Updated 2 weeks ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- ☆154Updated 3 months ago
- Code snippets to reproduce MCP tool poisoning attacks.☆188Updated 8 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆107Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆102Updated last month
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Updated last year
- ☆106Updated 3 months ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆114Updated 2 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆56Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆37Updated 5 months ago