PleoMorph commited on
Commit
490520d
·
verified ·
1 Parent(s): 88e26a5

Upload agents/training_summary.json with huggingface_hub

Browse files
Files changed (1) hide show
  1. agents/training_summary.json +192 -0
agents/training_summary.json ADDED
@@ -0,0 +1,192 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "timestamp": "2025-11-26T10:59:07.631773",
3
+ "device": "mps",
4
+ "num_samples": 11104,
5
+ "num_classes": 164,
6
+ "input_dim": 384,
7
+ "red_team_agent": {
8
+ "parameters": 1292862,
9
+ "best_val_acc": 96.57657742500305,
10
+ "test_acc": 96.82063460350037,
11
+ "num_tactics": 14,
12
+ "num_techniques": 164,
13
+ "execution_modes": [
14
+ "sandbox",
15
+ "production",
16
+ "simulation"
17
+ ]
18
+ },
19
+ "vulnerability_agent": {
20
+ "parameters": 670122,
21
+ "best_val_acc": 96.57657742500305,
22
+ "test_acc": 96.94060683250427,
23
+ "num_vuln_types": 164,
24
+ "num_severity": 4
25
+ },
26
+ "label_mapping": {
27
+ "0": "ANONYMITY_EXPLOITATION",
28
+ "1": "All of these services use similar components under the hood,...",
29
+ "2": "Attackers use reconnaissance to identify organizational stru...",
30
+ "3": "Business Email Compromise",
31
+ "4": "By measuring these timing differences, attackers can infer w...",
32
+ "5": "COLLECTION",
33
+ "6": "CREDENTIAL_ACCESS",
34
+ "7": "CREDENTIAL_HARVESTING",
35
+ "8": "CRYPTOGRAPHIC_EXPLOITATION",
36
+ "9": "Cache Attacks In Computing Environments",
37
+ "10": "Chinese Hackers use Visual Studio Code to Target Asian Governments",
38
+ "11": "Common attack vectors include supplier payment redirection, ...",
39
+ "12": "Common vulnerability patterns include hardcoded credentials,...",
40
+ "13": "DATA_EXFILTRATION",
41
+ "14": "DEFENSE_EVASION",
42
+ "15": "EXPLOITING VULNERABLE EMAIL CLIENTS\n========================...",
43
+ "16": "EXTRACTED PATTERNS SUMMARY:\n===========================\nCVEs...",
44
+ "17": "Email clients represent a significant attack surface due to ...",
45
+ "18": "Exploiting Vulnerable Email Clients",
46
+ "19": "FIRMWARE_EXPLOITATION",
47
+ "20": "For this, we exploit a container escape vulnerability using ...",
48
+ "21": "HARDWARE_EXPLOITATION",
49
+ "22": "Here's how the attack works: We craft a malicious SavedModel...",
50
+ "23": "ICS_EXPLOITATION",
51
+ "24": "INITIAL_ACCESS",
52
+ "25": "IOT_EXPLOITATION",
53
+ "26": "In conclusion, AI/ML infrastructure is the new attack surfac...",
54
+ "27": "Initial access: exploit the MLflow SQL injection",
55
+ "28": "IoT devices present a massive attack surface with generally ...",
56
+ "29": "Iot Security And Bug Hunting",
57
+ "30": "KERBEROS DELEGATION ATTACKS\n===========================",
58
+ "31": "Kerberos Delegation Attacks",
59
+ "32": "LARGEST SUPPLY CHAIN HACK IN HISTORY ZOMG!!!!111",
60
+ "33": "LATERAL_MOVEMENT",
61
+ "34": "Let me demonstrate the exploit chain",
62
+ "35": "Let's start with the attack surface",
63
+ "36": "Let's talk about the tools we're using. Metasploit has modul",
64
+ "37": "MEMORY_CORRUPTION",
65
+ "38": "NETWORK_EXPLOITATION",
66
+ "39": "Our attack demonstrations show how compromising IoT devices ...",
67
+ "40": "Our exploit chain begins with a crafted email containing a m...",
68
+ "41": "Our first vulnerability is CVE-2024-8901 in TensorFlow Servi...",
69
+ "42": "PERSISTENCE",
70
+ "43": "Ransomware In Action MedusaLocker ReadText34",
71
+ "44": "Secret Handshakes Over Bluetooth Low Energy",
72
+ "45": "Secure your AI infrastructure before it becomes your biggest...",
73
+ "46": "Security Unit Testing And Automation",
74
+ "47": "The CUDA runtime can be exploited to escape container bounda...",
75
+ "48": "The Gremlin Stealer Malware",
76
+ "49": "The attack requires the victim to import a USB device, but c...",
77
+ "50": "The attack surface is determined by SPNs (Service Principal ...",
78
+ "51": "The attacks combine technical elements like domain spoofing ...",
79
+ "52": "The second vulnerability, CVE-2024-8902, affects PyTorch's m...",
80
+ "53": "The vulnerability exists in the way certain email clients ha...",
81
+ "54": "The vulnerability occurs when parsing USB packet headers - t...",
82
+ "55": "These attacks are particularly dangerous in cloud environmen...",
83
+ "56": "Today we'll discuss cache attacks and their implications acr...",
84
+ "57": "Traditional security testing tools focus on exploitation rat...",
85
+ "58": "Usb Over Ip Vulnerabilities",
86
+ "59": "We demonstrate how attackers use lookalike domains and email...",
87
+ "60": "We demonstrate how compromising a service account with deleg...",
88
+ "61": "We propose security unit testing that focuses on flaws rathe...",
89
+ "62": "We're using MITRE ATT&CK technique T1190 for initial access ...",
90
+ "63": "We've identified several attack vectors: Flush+Reload, Prime...",
91
+ "64": "We've tested these exploits against Fortune 500 companies' M...",
92
+ "65": "active_directory",
93
+ "66": "alternative_path",
94
+ "67": "api_exploitation",
95
+ "68": "apt_dns_profiling",
96
+ "69": "asrep_roasting",
97
+ "70": "attack",
98
+ "71": "attack_chain",
99
+ "72": "attack_flow",
100
+ "73": "attack_method",
101
+ "74": "attack_pattern",
102
+ "75": "attack_technique",
103
+ "76": "authentication_bypass",
104
+ "77": "automated_reconnaissance",
105
+ "78": "bgp",
106
+ "79": "big_data_exploitation",
107
+ "80": "bitcoin_transaction_malleability",
108
+ "81": "browser_exploitation",
109
+ "82": "civil_cyber",
110
+ "83": "cloudflare.bat",
111
+ "84": "comprehensive_attack_flow",
112
+ "85": "critical_dependency",
113
+ "86": "critical_point",
114
+ "87": "cross_account_service_manipulation",
115
+ "88": "cross_technique_vulnerability",
116
+ "89": "cve",
117
+ "90": "deleted files log",
118
+ "91": "dotnet",
119
+ "92": "exploitation_pathway",
120
+ "93": "fixed cve model",
121
+ "94": "fraud_detection_system",
122
+ "95": "golden_ticket",
123
+ "96": "hardware",
124
+ "97": "hardware_exploitation",
125
+ "98": "how hackers hide (Intro to Beacon Object Files - with Empire C2!)",
126
+ "99": "industrial_control_exploitation",
127
+ "100": "initial_access",
128
+ "101": "ios_forensics",
129
+ "102": "iot_exploitation",
130
+ "103": "javascript_exploitation",
131
+ "104": "kerberoasting",
132
+ "105": "kerberos_attack",
133
+ "106": "kernel",
134
+ "107": "mass_internet_reconnaissance",
135
+ "108": "memory_corruption",
136
+ "109": "mitre_technique",
137
+ "110": "mpc_wallets",
138
+ "111": "multiple blackhat transcripts",
139
+ "112": "nation_state_threat_attribution",
140
+ "113": "network_authentication_fuzzing",
141
+ "114": "network_infrastructure_exploitation",
142
+ "115": "network_protocol_evasion",
143
+ "116": "network_protocol_exploitation",
144
+ "117": "old files",
145
+ "118": "organized_financial_crime",
146
+ "119": "pass_the_hash",
147
+ "120": "pass_the_hash_detection",
148
+ "121": "pass_the_ticket",
149
+ "122": "permutation",
150
+ "123": "phishing",
151
+ "124": "platform_node",
152
+ "125": "pos_exploitation",
153
+ "126": "powershell_memory_analysis",
154
+ "127": "privilege_escalation",
155
+ "128": "proprietary_protocol_exploitation",
156
+ "129": "pylingual_attack",
157
+ "130": "pylingual_attack_flow",
158
+ "131": "pylingual_component",
159
+ "132": "python_opcode",
160
+ "133": "python_version_permutation",
161
+ "134": "python_version_variant",
162
+ "135": "requirements-realtime-attack-paths",
163
+ "136": "sample blackhat transcript",
164
+ "137": "scenario",
165
+ "138": "side_channel_attack",
166
+ "139": "silver_ticket",
167
+ "140": "social_engineering",
168
+ "141": "social_engineering_technical",
169
+ "142": "storage_infrastructure_exploitation",
170
+ "143": "strategic_threat_analysis",
171
+ "144": "supply_chain",
172
+ "145": "tech_permutation",
173
+ "146": "technical_permutation",
174
+ "147": "technique",
175
+ "148": "technique_specialization",
176
+ "149": "telecommunications_fraud",
177
+ "150": "threat_actor",
178
+ "151": "tool",
179
+ "152": "transcript embeddings validation report",
180
+ "153": "unknown",
181
+ "154": "verilog_hardware_exploitation",
182
+ "155": "voip_infrastructure_exploitation",
183
+ "156": "vulnerability",
184
+ "157": "vulnerability_chain",
185
+ "158": "vulnerability_cluster",
186
+ "159": "vulnerability_detail",
187
+ "160": "vulnerability_exploitation",
188
+ "161": "wearable_authentication",
189
+ "162": "web_exploitation",
190
+ "163": "wireless_protocol_attack"
191
+ }
192
+ }