AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning
☆429Feb 15, 2022Updated 4 years ago
Alternatives and similar repositories for AutoPentest-DRL
Users that are interested in AutoPentest-DRL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A logic-based enterprise network security analyzer☆142Jan 28, 2023Updated 3 years ago
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆815Apr 21, 2023Updated 2 years ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Source code about machine learning and security.☆2,082Sep 2, 2022Updated 3 years ago
- ☆19Feb 22, 2022Updated 4 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Oct 13, 2023Updated 2 years ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆29Apr 2, 2025Updated 11 months ago
- Autonomous Security Analysis and Penetration Testing☆25Dec 8, 2022Updated 3 years ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,023Feb 6, 2026Updated last month
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆56Dec 19, 2024Updated last year
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,759Feb 11, 2026Updated last month
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Jul 16, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆113Sep 15, 2022Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Jan 23, 2021Updated 5 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆30Dec 22, 2021Updated 4 years ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆720Aug 17, 2021Updated 4 years ago
- Automated Penetration Testing Agentic Framework Powered by Large Language Models☆12,196Feb 23, 2026Updated last month
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Swarms of AI Agents, Pentesting your software in real-time. Orchstrate machine-speed collaborative attacks to find vulnerabilites in your…☆215Updated this week
- Automation library for Metasploit☆406Jul 15, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆915Mar 22, 2026Updated last week
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 6 months ago
- Core A2P2V functionality (command line based)☆68May 14, 2024Updated last year
- d(ockerp)wn - a docker pwn tool manager☆156Jun 8, 2021Updated 4 years ago
- Convolutional neural network for analyzing pentest screenshots☆1,280Mar 8, 2026Updated 3 weeks ago
- Wicked sick v2.0 script is intended to automate your reconnaissance process in an organized fashion.☆149Mar 3, 2026Updated 3 weeks ago
- Pentest AI utilizes machine learning to fully automate penetration testing and exploitation for assessing port, web, and application secu…☆79May 28, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- WebSocket Connection Smuggler☆47Sep 30, 2022Updated 3 years ago
- ☆332Dec 8, 2022Updated 3 years ago
- Machine Learning Network Share Password Hunting Toolkit☆130Mar 21, 2020Updated 6 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆376Nov 8, 2022Updated 3 years ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆91Jan 9, 2023Updated 3 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆628May 2, 2025Updated 10 months ago