phreakAI / metasploit-gym
An environment for testing AI agents against networks using Metasploit.
☆39Updated last year
Alternatives and similar repositories for metasploit-gym:
Users that are interested in metasploit-gym are comparing it to the libraries listed below
- Data Scientists Go To Jupyter☆62Updated 2 months ago
- source code for the offsecml framework☆37Updated 7 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆52Updated 2 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆99Updated 11 months ago
- Malware Bypass Research using Reinforcement Learning☆103Updated 9 months ago
- ☆11Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆56Updated this week
- ☆64Updated last week
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆97Updated 10 months ago
- Code for shelLM tool☆49Updated this week
- ☆33Updated last month
- ☆114Updated 2 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆46Updated last week
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆43Updated this week
- ATLAS tactics, techniques, and case studies data☆54Updated 3 months ago
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆59Updated 8 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆41Updated 2 months ago
- ☆101Updated 7 months ago
- ☆16Updated 9 months ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆33Updated last year
- ☆27Updated last week
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆45Updated last year
- XBOW Validation Benchmarks☆65Updated 4 months ago
- Copy cat model for Proofpoint☆81Updated 4 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 4 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated this week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆46Updated 3 months ago
- 2021 Machine Learning Security Evasion Competition☆12Updated 3 years ago
- A LLM explicitly designed for getting hacked☆134Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆80Updated 8 months ago