/Machine_Learning_CTF_Challenges

CTF challenges designed and implemented in machine learning applications

Primary LanguageHTML

Machine Learning CTF Challenges

As artificial intelligence and machine learning are concurring the world ๐ŸŒ, it becomes of most interest to evaluate the impact on cybersecurity caused by AI & ML. Most of the AI / ML innovations in cybersecurity are related to cyber defense / cyber threat intelligence, for example, intelligent SIEM programs, AI-powered malware scanners, etc. But the real question is โ€œCan researchers leverage AI / ML for offensive security OR Can they beat AI / ML algorithms with custom build cybersecurity practices?โ€. It turns out, thatโ€™s the new frontier ๐ŸŽฏ in offensive security.

This repository contains CTF (Capture The Flag ๐Ÿšฉ) challenges designed and implemented in machine learning applications. Each challenge is organized into separate independent modules. The main focus area of this repo is to show the importance of cybersecurity practices that need to be implemented in machine learning applications.

CTF Challenges ๐Ÿ“‚

  • Fourtune : In this web application challenge, the ๐Ÿ•ต๏ธ security researcher needs to bypass AI Corp's Identity Verification neural network.

๐Ÿ’ญ If you want to contribute to the above list of CTF challenges (please do), send me a pull request or ping me at LinkedIn Badge

Stay tuned for more challenges being added to the repo. ๐Ÿ‘€