Modelling Capture-the-Flag Challenges Using Reinforcement Learning
☆15Jul 30, 2022Updated 3 years ago
Alternatives and similar repositories for CTF-RL
Users that are interested in CTF-RL are comparing it to the libraries listed below
Sorting:
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆29Apr 2, 2025Updated 11 months ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆30Dec 22, 2021Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- Modelling SQL Injection Using Reinforcement Learning☆20Oct 13, 2021Updated 4 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- Fuzz testing framework for binary programs using AI☆53Sep 13, 2023Updated 2 years ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆55Dec 19, 2024Updated last year
- ☆19Feb 22, 2022Updated 4 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- GridAttackSim: Smart Grid Attack Simulation Framework☆27Feb 27, 2023Updated 3 years ago
- TVMFuzz: fuzzing tensor-level intermediate representation in TVM☆30May 24, 2020Updated 5 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- A logic-based enterprise network security analyzer☆137Jan 28, 2023Updated 3 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- scrapped ideas and garbage code☆13May 8, 2021Updated 4 years ago
- ☆11Jan 11, 2022Updated 4 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN☆37Jul 6, 2023Updated 2 years ago
- zkSnark circuit compiler☆12Feb 19, 2026Updated 2 weeks ago
- ☆14Mar 21, 2024Updated last year
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago