Shulong98 / GAIL-PTView external linksLinks
☆19Feb 22, 2022Updated 3 years ago
Alternatives and similar repositories for GAIL-PT
Users that are interested in GAIL-PT are comparing it to the libraries listed below
Sorting:
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Jul 16, 2024Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆30Aug 18, 2025Updated 5 months ago
- ☆10Apr 20, 2022Updated 3 years ago
- ☆103Sep 29, 2022Updated 3 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- Exploit codes for rconfig <= 3.9.4☆12Mar 17, 2020Updated 5 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 4 months ago
- implementation of the paper "APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Emb…☆12Dec 24, 2024Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- The code implementation of MuScleLoRA (Accepted in ACL 2024)☆10Dec 1, 2024Updated last year
- Authors' implementation of PEER☆11Jul 13, 2023Updated 2 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- ☆14Feb 26, 2025Updated 11 months ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- TTCP CAGE Challenge 2☆56Sep 25, 2025Updated 4 months ago
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated 11 months ago
- Component Services Volatile Environment LPE☆13Jun 28, 2025Updated 7 months ago
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆420Feb 15, 2022Updated 3 years ago
- An environment for testing AI pentesting agents against a simulated network.☆204Feb 28, 2024Updated last year
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆17Mar 19, 2025Updated 10 months ago
- nacos 任意文件读写☆11Aug 29, 2024Updated last year
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Feb 3, 2024Updated 2 years ago
- Simple Chatbot for testing AI Red Team tooling☆16Feb 11, 2025Updated last year
- Tools for multilanguage & Markdown multilang☆11Apr 21, 2024Updated last year
- ☆11Oct 30, 2024Updated last year
- Fuzzing Infrastructure with k8s & cephfs☆12Jul 23, 2020Updated 5 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Aug 26, 2022Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated last year
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- ☆12Aug 3, 2024Updated last year
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated last year
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆32Apr 28, 2025Updated 9 months ago