dstl / YAWNING-TITANLinks
YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for autonomous cyber operations.
☆65Updated last year
Alternatives and similar repositories for YAWNING-TITAN
Users that are interested in YAWNING-TITAN are comparing it to the libraries listed below
Sorting:
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆139Updated last week
- An environment for testing AI pentesting agents against a simulated network.☆196Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆41Updated last year
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆56Updated last month
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆49Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆232Updated last year
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆84Updated 10 months ago
- Cyber Operations Research Gym☆106Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Updated 3 years ago
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆40Updated 11 months ago
- A Reinforcement Learning (RL) simulation environment built for training and evaluating defensive and offensive autonomous models on simul…☆34Updated 4 months ago
- ☆59Updated 3 months ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Updated last year
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆67Updated 2 months ago
- ATLAS tactics, techniques, and case studies data☆93Updated last week
- A Simulated Optimal Intrusion Response Game☆21Updated 3 years ago
- Multi-Agent Reinforcement Learning on network-security☆20Updated 3 years ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆31Updated 11 months ago
- Project Mantis: Hacking Back the AI-Hacker; Prompt Injection as a Defense Against LLM-driven Cyberattacks☆92Updated 7 months ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆28Updated 8 months ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆26Updated 9 months ago
- ☆51Updated last week
- Graphs in Cybersecurity - Bloodhound☆19Updated last year
- ARCD Primary-Level AI Training Environment (PrimAITE)☆26Updated 9 months ago
- Autonomous Security Analysis and Penetration Testing☆24Updated 3 years ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆57Updated 2 years ago
- GPT-3 use cases for Cybersecurity☆53Updated 2 years ago
- ☆71Updated 3 weeks ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆56Updated last year
- TTCP CAGE Challenge 2☆52Updated 3 months ago