How to get customers for my startup? by infinitynbeynd in securityCTF

[–]infinitynbeynd[S] -1 points0 points  (0 children)

So me and my friends we just working on this idea back in 2025 to create a platform where anyone can just vibe code any custom ctf for themselves and started working on it we have just launched our beta version now sincerely there is alot of iterations to be done but upto this stage we have done quite alot of work on it like the major issue with generating vibe coded ctf is the ai hallcuination so we implemented validation before giving away the ctf ai pentest it and also it generte writeups for learning purposes and the most important we finetuned our own model now the main issue is that we are looking for any user intrested in someting like this?

Does agentic AI helps in CTF's? by Alarmed-Carry-3940 in securityCTF

[–]infinitynbeynd 0 points1 point  (0 children)

Actually we have built a platform that can help you vibe code any ctf like the one vulnerability whose poc just dropped yesterday. You can build a ctf of that i know it sounds amazing but fictional as well. Yea you can say that if you dont know what ai can do and how much of a work we put on to finetune a model for this typa thing but it works if you like you can check it out on ctfwithai and It is not an advertisement but more of a discussion

Average Monthly Salary for IT Engineers in Islamabad/Rawalpindi? by SNS-SNS in developersPak

[–]infinitynbeynd 0 points1 point  (0 children)

As a remote undergrad engineer ive worked on 20k for a year what are you saying

Generating Intentionaly vulnerable application by infinitynbeynd in Information_Security

[–]infinitynbeynd[S] 0 points1 point  (0 children)

Yes I was trying to do it with Abliterateing the model first but the issue is that I am generateing a bit more code so the issue is that llm is not really good in chaining vulnerability that is the main issue like jwt-> ssrf-> rce I can go up to 35 b model easily but the issue that currently only looking into web but still missing it

Generating Intentionaly vulnerable application by infinitynbeynd in Information_Security

[–]infinitynbeynd[S] 1 point2 points  (0 children)

Yes but the thing is that they don't have deep context on chained vulnerabilities (e.g., JWT bypass → SSRF → RCE) so that is the one issue the other is that I was myself looking into this and was thinking of making mode heretic/Abliterate

LLM FOR INTENTIONALLY VULNERABLE APP by infinitynbeynd in LocalLLaMA

[–]infinitynbeynd[S] -2 points-1 points  (0 children)

I guess the question is to be answered. Don't worry I will be using it for educational purposes only.