crond-jaist / CyATPView external linksLinks
CyATP: Cybersecurity Awareness Training Platform
☆23Feb 15, 2022Updated 3 years ago
Alternatives and similar repositories for CyATP
Users that are interested in CyATP are comparing it to the libraries listed below
Sorting:
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Feb 15, 2022Updated 3 years ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 3 years ago
- CyTrONE: Integrated Cybersecurity Training Framework☆88Mar 13, 2025Updated 11 months ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- Autonomous Security Analysis and Penetration Testing☆25Dec 8, 2022Updated 3 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66May 21, 2024Updated last year
- GridAttackSim: Smart Grid Attack Simulation Framework☆27Feb 27, 2023Updated 2 years ago
- Web App for Football Coaches☆12Feb 8, 2024Updated 2 years ago
- OPAY WEBSITE CLONE☆17Jul 20, 2023Updated 2 years ago
- Front-Commerce is an agnostic frontend for ecommerce based on headless commerce & modern technologies: NodeJS, React, GraphQL. Our fronte…☆14Dec 16, 2024Updated last year
- DreamSmooth: Improving Model-Based RL with Reward Smoothing (ICLR 2024)☆12May 6, 2024Updated last year
- A collection of heat engines, based on the OpenAI Gym environment framework for use with reinforcement learning applications.☆15Dec 20, 2021Updated 4 years ago
- A simple bot that open chests for you.☆14Nov 3, 2018Updated 7 years ago
- An educational space exploration mobile game☆14Apr 24, 2024Updated last year
- This is a collection of notes and discussions at THU Physics about quantum gravity. Main reference: Lectures on Quantum Gravity and Black…☆11Oct 19, 2018Updated 7 years ago
- code for polite☆11Feb 28, 2024Updated last year
- ☆22Nov 22, 2025Updated 2 months ago
- Data Analytics and Machine learning 2024 is a National Level workshop organised by SRM Analytics Society of India Student Chapter. This p…☆24Jul 11, 2025Updated 7 months ago
- Modeling and simulation of ICS devices☆12Jan 28, 2026Updated 2 weeks ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- All Material Design Components in Kotlin☆10Oct 4, 2020Updated 5 years ago
- ☆14Mar 21, 2024Updated last year
- web information gathering / Grab links☆45Nov 1, 2019Updated 6 years ago
- Official Code Repo for the paper "Learning to Play Atari in a World of Tokens" accepted at ICML, 2024☆11Jun 6, 2024Updated last year
- Snooze - Log aggregation and alerting☆10Sep 19, 2025Updated 4 months ago
- paper on dexpilot☆15Oct 14, 2019Updated 6 years ago
- Submission Under Review☆17May 15, 2025Updated 8 months ago
- ☆11Mar 9, 2018Updated 7 years ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- Marionette Configurator☆20Apr 29, 2024Updated last year
- exploit-db备份☆14Jan 5, 2022Updated 4 years ago
- Robot simulator using web technologies, just JavaScript☆10Feb 13, 2020Updated 6 years ago
- A "gym" style toolkit for building lightweight NAS systems.☆13Jun 13, 2022Updated 3 years ago
- ☆11May 23, 2024Updated last year
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- A tool to integrate post-quantum secure TLS in NGINX using OpenSSL☆11Nov 15, 2021Updated 4 years ago
- ☆13Mar 1, 2024Updated last year
- A very simple app to make formatted flashcards from Google Sheets☆10Jul 25, 2018Updated 7 years ago
- Concise Reasoning via Reinforcement Learning☆13Apr 16, 2025Updated 9 months ago