As the realms of artificial intelligence and machine learning continue to shape our world ๐, the imperative to assess their influence on cybersecurity intensifies. While many AI/ML breakthroughs in cybersecurity revolve around defense and threat intelligence, such as intelligent ๐ป SIEM systems and AI-driven malware detection, an intriguing question arises: "Can researchers harness AI/ML for offensive security, or can they outmaneuver AI/ML algorithms with innovative cybersecurity approaches?" This presents a captivating new horizon in the domain of offensive security.๐
Within this repository lie an array of engaging CTF (Capture The Flag ๐ฉ) challenges meticulously crafted for applications which leverage machine learning algorithms in their backend. The intent of this repository to emphasize the need for implementation of security measures within machine learning applications, safeguarding ๐ก๏ธ them against the ever-evolving threat landscape. It serves as a guiding beacon in fortifying the convergence of technology and security๐.
Name | Category | Description | Difficulty | References |
---|---|---|---|---|
Dolos | Web - Prompt Injection Attack | Flag is at same directory as of flask app, [FLAG].txt. | Easy | |
Heist | Web - Data Poisoning Attack | Compromise CityPolice's AI cameras and secure a smooth escape for Heist crews red getaway car ! | Medium | |
Persuade | Web - Model Serialization Attack | Flag is at /app/InternalFolder/Flag.txt, not on the website. Find it. | Medium | |
Fourtune | Web - Model Extraction Attack | Bypass AI Corp's identity verification to view the flag | Hard |
๐ญ If you want to contribute to the above list of CTF challenges (please do), submit a pull request or ping me at
Stay tuned for more challenges being added to the repo. ๐