phreakAI / metasploit-gym
An environment for testing AI agents against networks using Metasploit.
☆37Updated last year
Related projects ⓘ
Alternatives and complementary repositories for metasploit-gym
- Payloads for Attacking Large Language Models☆64Updated 4 months ago
- Central repo for talks and presentations☆43Updated 4 months ago
- ☆11Updated last year
- Data Scientists Go To Jupyter☆57Updated last week
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆29Updated last year
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆95Updated 8 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆95Updated 9 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆44Updated last week
- source code for the offsecml framework☆35Updated 5 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆56Updated 6 months ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆39Updated this week
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- Code for shelLM tool☆46Updated 3 weeks ago
- ☆99Updated 5 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆48Updated 5 months ago
- ☆62Updated last month
- Code repository for "Machine Learning For Red Team Hackers".☆32Updated 4 years ago
- Dropbox LLM Security research code and results☆217Updated 6 months ago
- CTF challenges designed and implemented in machine learning applications☆114Updated 2 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆93Updated last year
- ☆74Updated last week
- ComPromptMized: Unleashing Zero-click Worms that Target GenAI-Powered Applications☆193Updated 8 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆119Updated 2 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- ☆94Updated last month
- A collection of awesome resources related AI security☆131Updated 8 months ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆44Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 3 months ago
- ☆15Updated 7 months ago