FMZennaro / CTF-RL
Modelling Capture-the-Flag Challenges Using Reinforcement Learning
☆15Updated 2 years ago
Alternatives and similar repositories for CTF-RL:
Users that are interested in CTF-RL are comparing it to the libraries listed below
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆32Updated 4 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated last week
- Multi-Agent Reinforcement Learning on network-security☆19Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆26Updated 3 weeks ago
- A Simulated Optimal Intrusion Response Game☆21Updated 3 years ago
- OpenAI Gym environment for binary fuzzing based on afl☆23Updated 6 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆17Updated last year
- Modelling SQL Injection Using Reinforcement Learning☆19Updated 3 years ago
- Benchmark data from the article "AutoPT: How Far Are We from End2End Automated Web Penetration Testing?"☆13Updated 5 months ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆21Updated 2 years ago
- Cyber Code Intelligence (CyberCI)☆14Updated 4 years ago
- ☆15Updated 3 years ago
- ☆22Updated 3 years ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆32Updated 4 months ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 5 years ago
- The FlexFringe tool for flexible learning of state machines (deterministic automata) from traces. See the paper at https://arxiv.org/abs/…☆19Updated last week
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- ☆18Updated 3 years ago
- ☆55Updated 5 years ago
- ☆54Updated 2 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆25Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆58Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆41Updated last month
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆13Updated 3 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆67Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆55Updated 5 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year