A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
☆142Mar 25, 2026Updated 2 weeks ago
Alternatives and similar repositories for csle
Users that are interested in csle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,026Apr 7, 2026Updated last week
- GNN MARL Approach for the CAGE-4 automated cyber defense challenge☆15Nov 18, 2025Updated 4 months ago
- ARCD Primary-Level AI Training Environment (PrimAITE)☆27Mar 18, 2025Updated last year
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 4 years ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- ☆59Sep 25, 2025Updated 6 months ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Cyber Operations Research Gym☆116Jun 3, 2024Updated last year
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆73Oct 27, 2025Updated 5 months ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆85Feb 23, 2025Updated last year
- A Reinforcement Learning (RL) simulation environment built for training and evaluating defensive and offensive autonomous models on simul…☆44Aug 26, 2025Updated 7 months ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- Collection of materials and code samples on reinforcement learning / optimal control and game theory☆24Apr 5, 2026Updated last week
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Collection of my network covert channel tools.☆17Mar 11, 2026Updated last month
- ☆23Jan 29, 2026Updated 2 months ago
- List of Red Team Resources☆18Jun 16, 2020Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- my solution for UC Berkeley AI projects pacman☆11Jul 25, 2020Updated 5 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- wsnet☆26Mar 4, 2026Updated last month
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Jul 27, 2023Updated 2 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆427Feb 15, 2022Updated 4 years ago
- Using reinforcement learning for vehicle lateral control, the input is information such as vehicle status and tracking error, and the out…☆14May 6, 2023Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Python Simulator for Evolutionary Game Theory on Networks☆19Sep 19, 2018Updated 7 years ago
- ☆12Nov 26, 2021Updated 4 years ago
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆13Dec 2, 2024Updated last year
- Merge coordination aims to minimize the negative impacts of the merging process on the target lane. The shockwave magnitude and duration …☆10Sep 21, 2020Updated 5 years ago
- 强化学习中纳什Qlearning 实现矩阵博弈☆30Feb 25, 2019Updated 7 years ago
- A Multi-Agent Simulation Framework and Analysis of the IOTA Tangle - Python implementation and PDF of M.Sc. thesis, Imperial College Lond…☆16Jul 6, 2023Updated 2 years ago