FMZennaro / CTF-RLView external linksLinks
Modelling Capture-the-Flag Challenges Using Reinforcement Learning
☆15Jul 30, 2022Updated 3 years ago
Alternatives and similar repositories for CTF-RL
Users that are interested in CTF-RL are comparing it to the libraries listed below
Sorting:
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆28Apr 2, 2025Updated 10 months ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- ☆17Mar 2, 2018Updated 7 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- Fuzz testing framework for binary programs using AI☆52Sep 13, 2023Updated 2 years ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆54Dec 19, 2024Updated last year
- An environment for testing AI pentesting agents against a simulated network.☆204Feb 28, 2024Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆48Oct 9, 2023Updated 2 years ago
- ☆19Feb 22, 2022Updated 3 years ago
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- [ACL 2024] Code for the paper "ALaRM: Align Language Models via Hierarchical Rewards Modeling"☆25Mar 28, 2024Updated last year
- Autonomous Security Analysis and Penetration Testing☆25Dec 8, 2022Updated 3 years ago
- Code for UI, backend, engine and statistical analysis for RE☆23Aug 7, 2021Updated 4 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- ☆25Feb 21, 2019Updated 6 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆29Dec 17, 2023Updated 2 years ago
- GridAttackSim: Smart Grid Attack Simulation Framework☆27Feb 27, 2023Updated 2 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- TVMFuzz: fuzzing tensor-level intermediate representation in TVM☆30May 24, 2020Updated 5 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- scrapped ideas and garbage code☆13May 8, 2021Updated 4 years ago
- ☆14Mar 21, 2024Updated last year
- Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN☆38Jul 6, 2023Updated 2 years ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- The code for the paper "A Bayesian Approach to Online Planning" published in ICML 2024.☆13Jun 17, 2024Updated last year
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- DreamSmooth: Improving Model-Based RL with Reward Smoothing (ICLR 2024)☆12May 6, 2024Updated last year
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 2 months ago
- ☆85Dec 18, 2020Updated 5 years ago
- ☆16Feb 22, 2025Updated 11 months ago
- zkSnark circuit compiler☆12Jan 8, 2026Updated last month