logo
|
Blog
  • Vulnerability Research
  • AI for Security
  • Security for AI
  • Web2
  • 🌐

Theori BLOG

Empowering Innovation with Security
Explore expert insights into offensive security and threat intelligence.
See AllAI for SecuritySecurity for AIVulnerability ResearchWeb2 SecurityAIxCC
Building Effective LLM Agents | AI Cyber Challenge

Building Effective LLM Agents | AI Cyber Challenge

How we learned to build effective LLM agents for hacking at DARPA's AI Cyber Challenge (AIxCC)
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC
AI Cyber Challenge and Theori's RoboDuck

AI Cyber Challenge and Theori's RoboDuck

An introduction to DARPA's AI Cyber Challnge and Theori's third place cyber reasoning system
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC
Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge

Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge

Agent trajectory walkthroughs of a fully autonomous hacking system
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC
Building Effective LLM Agents | AI Cyber Challenge

Building Effective LLM Agents | AI Cyber Challenge

How we learned to build effective LLM agents for hacking at DARPA's AI Cyber Challenge (AIxCC)
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC
AI Cyber Challenge and Theori's RoboDuck

AI Cyber Challenge and Theori's RoboDuck

An introduction to DARPA's AI Cyber Challnge and Theori's third place cyber reasoning system
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC
Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge

Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge

Agent trajectory walkthroughs of a fully autonomous hacking system
Xint's avatar
Aug 08, 2025
AI for SecurityAIxCC

Theori © 2025 All rights reserved.

RSS·Powered by Inblog