A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
☆142Feb 6, 2026Updated 3 weeks ago
Alternatives and similar repositories for csle
Users that are interested in csle are comparing it to the libraries listed below
Sorting:
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,010Feb 6, 2026Updated 3 weeks ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- ☆59Sep 25, 2025Updated 5 months ago
- Cyber Operations Research Gym☆113Jun 3, 2024Updated last year
- A Reinforcement Learning (RL) simulation environment built for training and evaluating defensive and offensive autonomous models on simul…☆42Aug 26, 2025Updated 6 months ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66May 21, 2024Updated last year
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆87Feb 23, 2025Updated last year
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆73Oct 27, 2025Updated 4 months ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- ☆11May 23, 2024Updated last year
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- A Multi-Agent Simulation Framework and Analysis of the IOTA Tangle - Python implementation and PDF of M.Sc. thesis, Imperial College Lond…☆15Jul 6, 2023Updated 2 years ago
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆18Jun 11, 2024Updated last year
- ☆37Jun 20, 2025Updated 8 months ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆23Mar 11, 2020Updated 5 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆29Apr 2, 2025Updated 11 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 3 weeks ago
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 3 years ago
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆427Feb 15, 2022Updated 4 years ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76May 3, 2024Updated last year
- A collection of environments and reference agents for planning and reinforcement learning research in partially observable, multi-agent …☆29Jun 2, 2025Updated 9 months ago
- This is an attempt to summarize feature engineering methods that I have learned over the course of my graduate school.☆11Mar 3, 2022Updated 4 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Nov 24, 2021Updated 4 years ago
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Mysql4 on Docker☆11May 20, 2016Updated 9 years ago