Upload agents/training_summary.json with huggingface_hub
Browse files- agents/training_summary.json +192 -0
agents/training_summary.json
ADDED
|
@@ -0,0 +1,192 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"timestamp": "2025-11-26T10:59:07.631773",
|
| 3 |
+
"device": "mps",
|
| 4 |
+
"num_samples": 11104,
|
| 5 |
+
"num_classes": 164,
|
| 6 |
+
"input_dim": 384,
|
| 7 |
+
"red_team_agent": {
|
| 8 |
+
"parameters": 1292862,
|
| 9 |
+
"best_val_acc": 96.57657742500305,
|
| 10 |
+
"test_acc": 96.82063460350037,
|
| 11 |
+
"num_tactics": 14,
|
| 12 |
+
"num_techniques": 164,
|
| 13 |
+
"execution_modes": [
|
| 14 |
+
"sandbox",
|
| 15 |
+
"production",
|
| 16 |
+
"simulation"
|
| 17 |
+
]
|
| 18 |
+
},
|
| 19 |
+
"vulnerability_agent": {
|
| 20 |
+
"parameters": 670122,
|
| 21 |
+
"best_val_acc": 96.57657742500305,
|
| 22 |
+
"test_acc": 96.94060683250427,
|
| 23 |
+
"num_vuln_types": 164,
|
| 24 |
+
"num_severity": 4
|
| 25 |
+
},
|
| 26 |
+
"label_mapping": {
|
| 27 |
+
"0": "ANONYMITY_EXPLOITATION",
|
| 28 |
+
"1": "All of these services use similar components under the hood,...",
|
| 29 |
+
"2": "Attackers use reconnaissance to identify organizational stru...",
|
| 30 |
+
"3": "Business Email Compromise",
|
| 31 |
+
"4": "By measuring these timing differences, attackers can infer w...",
|
| 32 |
+
"5": "COLLECTION",
|
| 33 |
+
"6": "CREDENTIAL_ACCESS",
|
| 34 |
+
"7": "CREDENTIAL_HARVESTING",
|
| 35 |
+
"8": "CRYPTOGRAPHIC_EXPLOITATION",
|
| 36 |
+
"9": "Cache Attacks In Computing Environments",
|
| 37 |
+
"10": "Chinese Hackers use Visual Studio Code to Target Asian Governments",
|
| 38 |
+
"11": "Common attack vectors include supplier payment redirection, ...",
|
| 39 |
+
"12": "Common vulnerability patterns include hardcoded credentials,...",
|
| 40 |
+
"13": "DATA_EXFILTRATION",
|
| 41 |
+
"14": "DEFENSE_EVASION",
|
| 42 |
+
"15": "EXPLOITING VULNERABLE EMAIL CLIENTS\n========================...",
|
| 43 |
+
"16": "EXTRACTED PATTERNS SUMMARY:\n===========================\nCVEs...",
|
| 44 |
+
"17": "Email clients represent a significant attack surface due to ...",
|
| 45 |
+
"18": "Exploiting Vulnerable Email Clients",
|
| 46 |
+
"19": "FIRMWARE_EXPLOITATION",
|
| 47 |
+
"20": "For this, we exploit a container escape vulnerability using ...",
|
| 48 |
+
"21": "HARDWARE_EXPLOITATION",
|
| 49 |
+
"22": "Here's how the attack works: We craft a malicious SavedModel...",
|
| 50 |
+
"23": "ICS_EXPLOITATION",
|
| 51 |
+
"24": "INITIAL_ACCESS",
|
| 52 |
+
"25": "IOT_EXPLOITATION",
|
| 53 |
+
"26": "In conclusion, AI/ML infrastructure is the new attack surfac...",
|
| 54 |
+
"27": "Initial access: exploit the MLflow SQL injection",
|
| 55 |
+
"28": "IoT devices present a massive attack surface with generally ...",
|
| 56 |
+
"29": "Iot Security And Bug Hunting",
|
| 57 |
+
"30": "KERBEROS DELEGATION ATTACKS\n===========================",
|
| 58 |
+
"31": "Kerberos Delegation Attacks",
|
| 59 |
+
"32": "LARGEST SUPPLY CHAIN HACK IN HISTORY ZOMG!!!!111",
|
| 60 |
+
"33": "LATERAL_MOVEMENT",
|
| 61 |
+
"34": "Let me demonstrate the exploit chain",
|
| 62 |
+
"35": "Let's start with the attack surface",
|
| 63 |
+
"36": "Let's talk about the tools we're using. Metasploit has modul",
|
| 64 |
+
"37": "MEMORY_CORRUPTION",
|
| 65 |
+
"38": "NETWORK_EXPLOITATION",
|
| 66 |
+
"39": "Our attack demonstrations show how compromising IoT devices ...",
|
| 67 |
+
"40": "Our exploit chain begins with a crafted email containing a m...",
|
| 68 |
+
"41": "Our first vulnerability is CVE-2024-8901 in TensorFlow Servi...",
|
| 69 |
+
"42": "PERSISTENCE",
|
| 70 |
+
"43": "Ransomware In Action MedusaLocker ReadText34",
|
| 71 |
+
"44": "Secret Handshakes Over Bluetooth Low Energy",
|
| 72 |
+
"45": "Secure your AI infrastructure before it becomes your biggest...",
|
| 73 |
+
"46": "Security Unit Testing And Automation",
|
| 74 |
+
"47": "The CUDA runtime can be exploited to escape container bounda...",
|
| 75 |
+
"48": "The Gremlin Stealer Malware",
|
| 76 |
+
"49": "The attack requires the victim to import a USB device, but c...",
|
| 77 |
+
"50": "The attack surface is determined by SPNs (Service Principal ...",
|
| 78 |
+
"51": "The attacks combine technical elements like domain spoofing ...",
|
| 79 |
+
"52": "The second vulnerability, CVE-2024-8902, affects PyTorch's m...",
|
| 80 |
+
"53": "The vulnerability exists in the way certain email clients ha...",
|
| 81 |
+
"54": "The vulnerability occurs when parsing USB packet headers - t...",
|
| 82 |
+
"55": "These attacks are particularly dangerous in cloud environmen...",
|
| 83 |
+
"56": "Today we'll discuss cache attacks and their implications acr...",
|
| 84 |
+
"57": "Traditional security testing tools focus on exploitation rat...",
|
| 85 |
+
"58": "Usb Over Ip Vulnerabilities",
|
| 86 |
+
"59": "We demonstrate how attackers use lookalike domains and email...",
|
| 87 |
+
"60": "We demonstrate how compromising a service account with deleg...",
|
| 88 |
+
"61": "We propose security unit testing that focuses on flaws rathe...",
|
| 89 |
+
"62": "We're using MITRE ATT&CK technique T1190 for initial access ...",
|
| 90 |
+
"63": "We've identified several attack vectors: Flush+Reload, Prime...",
|
| 91 |
+
"64": "We've tested these exploits against Fortune 500 companies' M...",
|
| 92 |
+
"65": "active_directory",
|
| 93 |
+
"66": "alternative_path",
|
| 94 |
+
"67": "api_exploitation",
|
| 95 |
+
"68": "apt_dns_profiling",
|
| 96 |
+
"69": "asrep_roasting",
|
| 97 |
+
"70": "attack",
|
| 98 |
+
"71": "attack_chain",
|
| 99 |
+
"72": "attack_flow",
|
| 100 |
+
"73": "attack_method",
|
| 101 |
+
"74": "attack_pattern",
|
| 102 |
+
"75": "attack_technique",
|
| 103 |
+
"76": "authentication_bypass",
|
| 104 |
+
"77": "automated_reconnaissance",
|
| 105 |
+
"78": "bgp",
|
| 106 |
+
"79": "big_data_exploitation",
|
| 107 |
+
"80": "bitcoin_transaction_malleability",
|
| 108 |
+
"81": "browser_exploitation",
|
| 109 |
+
"82": "civil_cyber",
|
| 110 |
+
"83": "cloudflare.bat",
|
| 111 |
+
"84": "comprehensive_attack_flow",
|
| 112 |
+
"85": "critical_dependency",
|
| 113 |
+
"86": "critical_point",
|
| 114 |
+
"87": "cross_account_service_manipulation",
|
| 115 |
+
"88": "cross_technique_vulnerability",
|
| 116 |
+
"89": "cve",
|
| 117 |
+
"90": "deleted files log",
|
| 118 |
+
"91": "dotnet",
|
| 119 |
+
"92": "exploitation_pathway",
|
| 120 |
+
"93": "fixed cve model",
|
| 121 |
+
"94": "fraud_detection_system",
|
| 122 |
+
"95": "golden_ticket",
|
| 123 |
+
"96": "hardware",
|
| 124 |
+
"97": "hardware_exploitation",
|
| 125 |
+
"98": "how hackers hide (Intro to Beacon Object Files - with Empire C2!)",
|
| 126 |
+
"99": "industrial_control_exploitation",
|
| 127 |
+
"100": "initial_access",
|
| 128 |
+
"101": "ios_forensics",
|
| 129 |
+
"102": "iot_exploitation",
|
| 130 |
+
"103": "javascript_exploitation",
|
| 131 |
+
"104": "kerberoasting",
|
| 132 |
+
"105": "kerberos_attack",
|
| 133 |
+
"106": "kernel",
|
| 134 |
+
"107": "mass_internet_reconnaissance",
|
| 135 |
+
"108": "memory_corruption",
|
| 136 |
+
"109": "mitre_technique",
|
| 137 |
+
"110": "mpc_wallets",
|
| 138 |
+
"111": "multiple blackhat transcripts",
|
| 139 |
+
"112": "nation_state_threat_attribution",
|
| 140 |
+
"113": "network_authentication_fuzzing",
|
| 141 |
+
"114": "network_infrastructure_exploitation",
|
| 142 |
+
"115": "network_protocol_evasion",
|
| 143 |
+
"116": "network_protocol_exploitation",
|
| 144 |
+
"117": "old files",
|
| 145 |
+
"118": "organized_financial_crime",
|
| 146 |
+
"119": "pass_the_hash",
|
| 147 |
+
"120": "pass_the_hash_detection",
|
| 148 |
+
"121": "pass_the_ticket",
|
| 149 |
+
"122": "permutation",
|
| 150 |
+
"123": "phishing",
|
| 151 |
+
"124": "platform_node",
|
| 152 |
+
"125": "pos_exploitation",
|
| 153 |
+
"126": "powershell_memory_analysis",
|
| 154 |
+
"127": "privilege_escalation",
|
| 155 |
+
"128": "proprietary_protocol_exploitation",
|
| 156 |
+
"129": "pylingual_attack",
|
| 157 |
+
"130": "pylingual_attack_flow",
|
| 158 |
+
"131": "pylingual_component",
|
| 159 |
+
"132": "python_opcode",
|
| 160 |
+
"133": "python_version_permutation",
|
| 161 |
+
"134": "python_version_variant",
|
| 162 |
+
"135": "requirements-realtime-attack-paths",
|
| 163 |
+
"136": "sample blackhat transcript",
|
| 164 |
+
"137": "scenario",
|
| 165 |
+
"138": "side_channel_attack",
|
| 166 |
+
"139": "silver_ticket",
|
| 167 |
+
"140": "social_engineering",
|
| 168 |
+
"141": "social_engineering_technical",
|
| 169 |
+
"142": "storage_infrastructure_exploitation",
|
| 170 |
+
"143": "strategic_threat_analysis",
|
| 171 |
+
"144": "supply_chain",
|
| 172 |
+
"145": "tech_permutation",
|
| 173 |
+
"146": "technical_permutation",
|
| 174 |
+
"147": "technique",
|
| 175 |
+
"148": "technique_specialization",
|
| 176 |
+
"149": "telecommunications_fraud",
|
| 177 |
+
"150": "threat_actor",
|
| 178 |
+
"151": "tool",
|
| 179 |
+
"152": "transcript embeddings validation report",
|
| 180 |
+
"153": "unknown",
|
| 181 |
+
"154": "verilog_hardware_exploitation",
|
| 182 |
+
"155": "voip_infrastructure_exploitation",
|
| 183 |
+
"156": "vulnerability",
|
| 184 |
+
"157": "vulnerability_chain",
|
| 185 |
+
"158": "vulnerability_cluster",
|
| 186 |
+
"159": "vulnerability_detail",
|
| 187 |
+
"160": "vulnerability_exploitation",
|
| 188 |
+
"161": "wearable_authentication",
|
| 189 |
+
"162": "web_exploitation",
|
| 190 |
+
"163": "wireless_protocol_attack"
|
| 191 |
+
}
|
| 192 |
+
}
|