Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be deployed in the emulation.
☆42Sep 20, 2024Updated last year
Alternatives and similar repositories for NASimEmu
Users that are interested in NASimEmu are comparing it to the libraries listed below
Sorting:
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Jul 16, 2024Updated last year
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆55Dec 19, 2024Updated last year
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆29Apr 2, 2025Updated 11 months ago
- An environment for testing AI pentesting agents against a simulated network.☆205Feb 28, 2024Updated 2 years ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66May 21, 2024Updated last year
- A Reinforcement Learning (RL) simulation environment built for training and evaluating defensive and offensive autonomous models on simul…☆42Aug 26, 2025Updated 6 months ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 3 years ago
- ☆59Sep 25, 2025Updated 5 months ago
- Multi-Agent Reinforcement Learning on network-security☆20Apr 12, 2022Updated 3 years ago
- ☆19Feb 22, 2022Updated 4 years ago
- The TTCP CAGE Challenges are a series of public challenges instigated to foster the development of autonomous cyber defensive agents. Thi…☆73Oct 27, 2025Updated 4 months ago
- Cyber Operations Research Gym☆113Jun 3, 2024Updated last year
- [IEEE T-IFS] AutoPT: How Far Are We from the Fully Automated Web Penetration Testing?☆32Aug 18, 2025Updated 6 months ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆57Feb 25, 2026Updated last week
- implementation of the paper "APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Emb…☆12Dec 24, 2024Updated last year
- This repository contains a python3 script that is used to deploy a GNS3 topology from a YAML file using GNS3 REST API.☆14Dec 8, 2022Updated 3 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆142Feb 6, 2026Updated 3 weeks ago
- GNN MARL Approach for the CAGE-4 automated cyber defense challenge☆15Nov 18, 2025Updated 3 months ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,010Feb 6, 2026Updated 3 weeks ago
- ☆12Jun 6, 2023Updated 2 years ago
- Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.☆23Sep 29, 2025Updated 5 months ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆87Feb 23, 2025Updated last year
- ARCD Primary-Level AI Training Environment (PrimAITE)☆26Mar 18, 2025Updated 11 months ago
- Mysql4 on Docker☆11May 20, 2016Updated 9 years ago
- Enterprise AI Security Platform - Real-time firewall protection for LLM applications against prompt injection, data leakage, and function…☆23Sep 14, 2025Updated 5 months ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated last year
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- ☆38Aug 8, 2024Updated last year
- ☆22Nov 22, 2025Updated 3 months ago
- The repository of Pentest-R1: Towards Autonomous Penetration Testing Reasoning Optimized via Two-Stage Reinforcement Learning.☆27Sep 8, 2025Updated 5 months ago
- Simple reliable transport (Cal EE 122 Project 1, Fall 2011)☆11Oct 11, 2013Updated 12 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- solver for discrete Mixed Observable Markov Decision Processes☆11Oct 30, 2020Updated 5 years ago
- Example code for the NNGeometry PyTorch library☆10Aug 20, 2025Updated 6 months ago
- 利用知识图谱分析网络安全事件☆42Mar 30, 2020Updated 5 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago