The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. This CAGE Challenge 4 (CC4) returns to a defence industry enterprise environment, and introduces a Multi-Agent Reinforcement Learning (MARL) scenario.
☆73Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for cage-challenge-4
Users that are interested in cage-challenge-4 are comparing it to the libraries listed below
Sorting:
- GNN MARL Approach for the CAGE-4 automated cyber defense challenge☆15Nov 18, 2025Updated 3 months ago
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated last year
- Cyber Operations Research Gym☆112Jun 3, 2024Updated last year
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆13Dec 2, 2024Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66May 21, 2024Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- ☆59Sep 25, 2025Updated 5 months ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,012Feb 6, 2026Updated last month
- CAGE Challenge 2 with bug fixes, an alternate simplified version and discussion/clarification about gameplay and using this environment.☆54Jan 7, 2026Updated 2 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆142Updated this week
- ☆19Jun 27, 2023Updated 2 years ago
- Multi-Agent Reinforcement Learning on network-security☆20Apr 12, 2022Updated 3 years ago
- AI-powered cryptocurrency trading bot built using deep reinforcement learning (DRL). The bot is designed as a research platform for devel…☆10Jan 18, 2025Updated last year
- Lightweight AI Telegram bot for Raspberry Pi Zero 2W - DeepSeek API, 85MB RAM, LCD display☆30Jan 29, 2026Updated last month
- ☆10Sep 24, 2021Updated 4 years ago
- This is a repository of personal studies on "storytelling with data".☆16Jan 28, 2021Updated 5 years ago
- Implementation code for GraphMIX: Graph Convolutional Value Decomposition in Multi-Agent Reinforcement Learning☆36Feb 13, 2021Updated 5 years ago
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆40Aug 21, 2025Updated 6 months ago
- ☆12Jul 4, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Determines whether the current OS X computer's firmware is up-to-date.☆10Feb 24, 2015Updated 11 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- ☆14May 1, 2025Updated 10 months ago
- ☆10Mar 6, 2023Updated 3 years ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Nov 9, 2024Updated last year
- stable-diffusion-webui, AI,Beautiful girl☆13Apr 4, 2023Updated 2 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- ☆10Jun 16, 2020Updated 5 years ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- The source code the for the ICLR'24 paper "Stabilizing Backpropagation Through Time to Learn Complex Physics"☆11May 17, 2024Updated last year
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆14Jun 27, 2022Updated 3 years ago
- realistic mouse movement created by a generative AI trained on human mouse data to bypass web-based bot detection and highlight security …☆10Jun 30, 2023Updated 2 years ago
- A ratatui based vertical and horizontal slider.☆37Feb 26, 2026Updated last week
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆33Jan 10, 2026Updated 2 months ago