[IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?
☆38Mar 28, 2026Updated last month
Alternatives and similar repositories for AutoPT
Users that are interested in AutoPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LiveSecBench:动态中文大模型安全榜单☆28Mar 9, 2026Updated 2 months ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Jul 16, 2024Updated last year
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆57Dec 19, 2024Updated last year
- ☆14Feb 21, 2025Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CLI enabling more autonomous black-box penetration tests using Large Language Models (LLMs)☆51Updated this week
- This repo contains the codes of the penetration test benchmark for Generative Agents presented in the paper "AutoPenBench: Benchmarking G…☆84Oct 28, 2025Updated 6 months ago
- ☆19Feb 22, 2022Updated 4 years ago
- ☆22Jul 26, 2025Updated 9 months ago
- ☆29Feb 2, 2024Updated 2 years ago
- World's fastest FRACTRAN interpeter☆16May 11, 2026Updated last week
- USTC信息安全实践课程讲义,简要介绍SageMath的常用函数使用,针对CTF的CRYPTO赛题的教程。☆14Mar 28, 2022Updated 4 years ago
- The Pentest Agent System is an autonomous penetration testing framework built on the MITRE ATT&CK framework.☆30Apr 16, 2025Updated last year
- PentestAgent is a novel LLM-driven penetration testing framework to automate intelligence gathering, vulnerability analysis, and exploita…☆126Dec 20, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PyTorch implementation of the paper: CASAGPT: Cuboid Arrangement and Scene Assembly for Interior Design [CVPR 2025]☆14Apr 5, 2025Updated last year
- ☆34Jun 4, 2024Updated last year
- Efficient IPv6 address discovery algorithm DET which combines density, information entropy and space tree. DET is short for detective, w…☆14Sep 18, 2023Updated 2 years ago
- Linux Auditing System logs pretty printer☆11Dec 22, 2019Updated 6 years ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆167Apr 7, 2025Updated last year
- Convert OpenVPN into Socks5 via Docker 将 OpenVPN 协议转为 Socks 协议,支持同时多开多个 OpenVPN 客户端,解决不同工作环境 OpenVPN 内网同时访问问题☆13Mar 13, 2024Updated 2 years ago
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- This repository includes main notebook of the code for our proposed RCGAN☆12Apr 10, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This is a Model Control Protocol (MCP) server that provides access to nmap network scanning functionality.☆15Apr 24, 2025Updated last year
- [TDSC 2025] InferDPT: Privacy-Preserving Inference for Closed-box Large Language Model☆43Nov 16, 2025Updated 6 months ago
- ☆45Jan 30, 2023Updated 3 years ago
- ☆10Mar 5, 2023Updated 3 years ago
- An audio steganalysis method based on CNN in the time domain.☆12Feb 25, 2021Updated 5 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- ☆13Jun 10, 2018Updated 7 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆30Dec 22, 2021Updated 4 years ago
- Multi-Agent Reinforcement Learning on network-security☆22Apr 12, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12May 23, 2024Updated last year
- ☆18Apr 7, 2023Updated 3 years ago
- Linux Firewall using Kernel Module☆11Nov 9, 2017Updated 8 years ago
- This is the official repository for the ICLR 2025 accepted paper Badrobot: Manipulating Embodied LLMs in the Physical World.☆43Jun 26, 2025Updated 10 months ago
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 6 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆29Apr 2, 2025Updated last year
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago