phreakAI / metasploit-gymLinks
An environment for testing AI agents against networks using Metasploit.
☆45Updated 2 years ago
Alternatives and similar repositories for metasploit-gym
Users that are interested in metasploit-gym are comparing it to the libraries listed below
Sorting:
- Data Scientists Go To Jupyter☆68Updated 10 months ago
- ☆66Updated 3 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Updated 2 years ago
- ☆154Updated 4 months ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆112Updated last year
- Payloads for Attacking Large Language Models☆116Updated 7 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆82Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆117Updated last year
- Dropbox LLM Security research code and results☆250Updated last year
- ATLAS tactics, techniques, and case studies data☆94Updated 2 weeks ago
- https://arxiv.org/abs/2412.02776☆67Updated last year
- ☆71Updated last month
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆56Updated last year
- LLM | Security | Operations in one github repo with good links and pictures.☆86Updated last week
- using ML models for red teaming☆45Updated 2 years ago
- source code for the offsecml framework☆46Updated last year
- Arxiv + Notion Sync☆20Updated 7 months ago
- Code for shelLM tool☆57Updated 11 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆63Updated 11 months ago
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆57Updated 2 years ago
- A curated list of large language model tools for cybersecurity research.☆477Updated last year
- CTF challenges designed and implemented in machine learning applications☆197Updated 3 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 11 months ago
- ☆52Updated this week
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆35Updated last year
- A collection of prompt injection mitigation techniques.☆26Updated 2 years ago
- A LLM explicitly designed for getting hacked☆164Updated 2 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Updated 5 years ago
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆92Updated this week
- Machine Learning Attack Series☆73Updated last year