dstl / YAWNING-TITAN
YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for autonomous cyber operations.
☆59Updated 8 months ago
Alternatives and similar repositories for YAWNING-TITAN:
Users that are interested in YAWNING-TITAN are comparing it to the libraries listed below
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆33Updated 4 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated this week
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆43Updated this week
- ☆52Updated 2 years ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆45Updated 5 months ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆24Updated last year
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆75Updated last year
- Cyber Operations Research Gym☆67Updated 7 months ago
- An environment for testing AI pentesting agents against a simulated network.☆175Updated 11 months ago
- ARCD Primary-Level AI Training Environment (PrimAITE)☆17Updated last year
- Multi-Agent Reinforcement Learning on network-security☆18Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆54Updated 3 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆80Updated 8 months ago
- TTCP CAGE Challenge 2☆46Updated 8 months ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆25Updated last month
- A Simulated Optimal Intrusion Response Game☆21Updated 2 years ago
- TTCP CAGE Challenge 3☆35Updated 9 months ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 2 years ago
- ☆101Updated 7 months ago
- A MITRE Caldera plugin☆40Updated 2 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆52Updated 2 years ago
- ☆12Updated last year
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆34Updated last month
- ☆27Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆103Updated 9 months ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆12Updated last month
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆41Updated 2 months ago
- Summarize CTI reports with OpenAI☆13Updated this week
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 6 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 9 months ago