☆12Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for -cyborg-cage-2
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below
Sorting:
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆13Dec 2, 2024Updated last year
- Results reproductions & comparisons between OpenSpiel implementations, associated paper & originating works☆18Mar 2, 2021Updated 5 years ago
- ☆59Sep 25, 2025Updated 5 months ago
- This repo contains code and visualisation for "Robust moving target defence against false data injection attacks in power grids"☆26Dec 8, 2022Updated 3 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- ☆11Aug 31, 2019Updated 6 years ago
- This is a repository of personal studies on "storytelling with data".☆16Jan 28, 2021Updated 5 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated last year
- ☆22Nov 22, 2025Updated 3 months ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- A projet for simulating the rescue after a disaster☆10Dec 4, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆87Feb 23, 2025Updated last year
- Cyber Operations Research Gym☆112Jun 3, 2024Updated last year
- modified datasets for remote sensing image caption☆11Apr 23, 2019Updated 6 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- Code for abstracting, evaluating, and visualizing Markov Decision Processes.☆10Jan 12, 2017Updated 9 years ago
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆11Aug 7, 2023Updated 2 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- ☆10Feb 28, 2019Updated 7 years ago
- Source code for the Joint Shapley values: a measure of joint feature importance☆13Sep 14, 2021Updated 4 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- N-Tuple Bandit Evolutionary Algorithm☆14May 8, 2020Updated 5 years ago
- Analysis of data from the videogame/eSport League of Legends☆12Nov 4, 2019Updated 6 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- code for paper -- "Seamless Satellite-image Synthesis"☆17Jul 30, 2024Updated last year
- ☆10Mar 10, 2021Updated 4 years ago
- Lookup donation history of a Political Action Committee to specific US federal election candidates using data sourced directly from the F…☆14Nov 14, 2022Updated 3 years ago
- This is the numerical approach proposed in the paper "Optimal Incentives to Mitigate Epidemics: A Stackelberg Mean Field Game Approach" b…☆12Nov 22, 2021Updated 4 years ago
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago