crond-jaist / AutoPentest-DRLLinks
AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning
☆406Updated 3 years ago
Alternatives and similar repositories for AutoPentest-DRL
Users that are interested in AutoPentest-DRL are comparing it to the libraries listed below
Sorting:
- An environment for testing AI pentesting agents against a simulated network.☆197Updated last year
- Automating Host Exploitation with AI☆548Updated 3 years ago
- A logic-based enterprise network security analyzer☆134Updated 2 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆138Updated this week
- ☆19Updated 3 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆194Updated last year
- GyoiThon is a growing penetration test tool using Machine Learning.☆798Updated 2 years ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆969Updated 2 weeks ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆374Updated 2 years ago
- A Test Project for a Network Security-oriented LLM Tool Emulating AutoGPT☆286Updated 2 years ago
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆881Updated 6 months ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆353Updated 3 years ago
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆636Updated this week
- Automation library for Metasploit☆402Updated 4 months ago
- Public datasets to help you address various cyber security problems.☆455Updated 3 years ago
- A curated list of awesome security platforms,including CTF/Security Response Center/Bug Tracker and so on.☆315Updated 2 years ago
- A curated list of intriguing open-source security tools, with my reviews and insights.☆624Updated 3 weeks ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆48Updated 11 months ago
- Tool for searching Exploits from Exploit Databases, etc.☆291Updated this week
- Totally Insecure Web Application Project (TIWAP)☆176Updated last year
- [Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For e…☆483Updated 5 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,396Updated last year
- EPSS & VEDAS Score Aggregator for CVEs☆254Updated this week
- ⚔️ A collection of awesome penetration testing resources, tools, and other shiny things.☆262Updated 2 years ago
- Search an exploit in the local exploitdb database by its CVE☆172Updated 3 years ago
- OWASP Honeypot, Automated Deception Framework.☆471Updated last year
- some prompt about cyber security☆279Updated 2 years ago
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆416Updated 3 years ago
- Hourly updated database of exploit and exploitation reports☆257Updated 10 months ago
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆172Updated 5 years ago