crond-jaist / AutoPentest-DRL
AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning
☆350Updated 3 years ago
Alternatives and similar repositories for AutoPentest-DRL:
Users that are interested in AutoPentest-DRL are comparing it to the libraries listed below
- An environment for testing AI pentesting agents against a simulated network.☆179Updated 11 months ago
- A logic-based enterprise network security analyzer☆114Updated 2 years ago
- ☆18Updated 3 years ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆809Updated 2 weeks ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆759Updated last year
- Automating Host Exploitation with AI☆532Updated 2 years ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆33Updated 5 months ago
- A curated list of awesome security tools, experimental case or other interesting things with LLM or GPT.☆574Updated last month
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆179Updated 11 months ago
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆162Updated 4 years ago
- A Test Project for a Network Security-oriented LLM Tool Emulating AutoGPT☆278Updated last year
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆319Updated 2 years ago
- NERVE Continuous Vulnerability Scanner☆455Updated last year
- fully automated pentesting tool☆508Updated 2 years ago
- Suricata rules for the new critical vulnerabilities☆80Updated 4 years ago
- OWASP Honeypot, Automated Deception Framework.☆452Updated 5 months ago
- Pre-Built Vulnerable Multiple API Scenarios Environments Based on Docker-Compose.☆391Updated 2 years ago
- Public datasets to help you address various cyber security problems.☆396Updated 2 years ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆593Updated 5 years ago
- A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.☆826Updated 3 weeks ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆166Updated 4 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,298Updated 3 months ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆126Updated this week
- [Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For e…☆464Updated 5 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆251Updated 4 years ago
- Totally Insecure Web Application Project (TIWAP)☆170Updated last year
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆125Updated last week
- Autonomous Security Analysis and Penetration Testing☆22Updated 2 years ago
- 👀CVE Simple List☆66Updated this week
- Mastering Machine Learning for Penetration Testing, published by Packt☆361Updated 2 years ago