Limmen / csle
A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
☆124Updated this week
Alternatives and similar repositories for csle:
Users that are interested in csle are comparing it to the libraries listed below
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆33Updated 4 months ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆59Updated 8 months ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆24Updated last year
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆43Updated this week
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆75Updated last year
- ☆52Updated 2 years ago
- Cyber Operations Research Gym☆67Updated 7 months ago
- A Simulated Optimal Intrusion Response Game☆21Updated 2 years ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆25Updated last month
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆45Updated 5 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆80Updated 8 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆41Updated 2 months ago
- TTCP CAGE Challenge 3☆35Updated 9 months ago
- TTCP CAGE Challenge 2☆46Updated 8 months ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆97Updated 10 months ago
- An environment for testing AI pentesting agents against a simulated network.☆175Updated 11 months ago
- Augmentation to Machine Readable CTI☆27Updated last month
- Malware Bypass Research using Reinforcement Learning☆103Updated 9 months ago
- Multi-Agent Reinforcement Learning on network-security☆18Updated 2 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆39Updated 3 months ago
- Graphical map of known Advanced Persistent Threats☆47Updated last year
- ☆23Updated last year
- A curated repository of incident response playbooks☆70Updated last year
- BlackBerry Threat Research & Intelligence☆96Updated last year
- ☆86Updated 5 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆125Updated 9 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 7 months ago
- ☆33Updated last month
- ☆18Updated 2 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆50Updated this week