☆59Sep 25, 2025Updated 6 months ago
Alternatives and similar repositories for cage-challenge-1
Users that are interested in cage-challenge-1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TTCP CAGE Challenge 2☆57Sep 25, 2025Updated 6 months ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Jul 16, 2024Updated last year
- Cyber Operations Research Gym☆116Jun 3, 2024Updated last year
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated 2 years ago
- GNN MARL Approach for the CAGE-4 automated cyber defense challenge☆15Nov 18, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆73Oct 27, 2025Updated 5 months ago
- ☆19Feb 22, 2022Updated 4 years ago
- ☆12Jun 6, 2023Updated 2 years ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆67May 21, 2024Updated last year
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 4 years ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,030Apr 7, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆55Dec 19, 2024Updated last year
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆143Mar 25, 2026Updated 3 weeks ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆85Feb 23, 2025Updated last year
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆29Apr 2, 2025Updated last year
- Combination of Maskable PPO and Recurrent PPO based on the sb3-contrib repository☆11Feb 22, 2023Updated 3 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Jul 27, 2023Updated 2 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- ☆12Jun 24, 2021Updated 4 years ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆17Aug 10, 2022Updated 3 years ago
- A Python 3 Bandit Visualization Package☆11Oct 16, 2017Updated 8 years ago
- Dynamic causal Bayesian optimisation (NeurIPS 2021)☆40Apr 24, 2023Updated 2 years ago
- Class project for COMP-781, Robotics. This is a CUDA-based collision detector for motion planning.☆13Apr 29, 2019Updated 6 years ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Nov 7, 2025Updated 5 months ago
- CAGE Challenge 2 with bug fixes, an alternate simplified version and discussion/clarification about gameplay and using this environment.☆56Jan 7, 2026Updated 3 months ago
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- Implementation of Hierarchical Deep Q-Learning (Kulkarni et al., 2016)☆36May 18, 2019Updated 6 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Jul 19, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- implementation of the paper "APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Emb…☆12Dec 24, 2024Updated last year
- Multi-Agent Reinforcement Learning on network-security☆20Apr 12, 2022Updated 4 years ago
- ☆15Jan 25, 2025Updated last year
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago