phreakAI / metasploit-gym
An environment for testing AI agents against networks using Metasploit.
☆42Updated 2 years ago
Alternatives and similar repositories for metasploit-gym:
Users that are interested in metasploit-gym are comparing it to the libraries listed below
- Data Scientists Go To Jupyter☆62Updated last month
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆101Updated last year
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆69Updated 2 weeks ago
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project☆44Updated last week
- An environment for testing AI pentesting agents against a simulated network.☆187Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 5 months ago
- ☆64Updated 3 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year
- Code for shelLM tool☆51Updated 2 months ago
- ATLAS tactics, techniques, and case studies data☆64Updated this week
- ☆242Updated 3 months ago
- Payloads for Attacking Large Language Models☆81Updated 9 months ago
- A LLM explicitly designed for getting hacked☆147Updated last year
- source code for the offsecml framework☆38Updated 10 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆46Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆63Updated 11 months ago
- Autonomous Security Analysis and Penetration Testing☆24Updated 2 years ago
- ☆127Updated 5 months ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆95Updated last year
- using ML models for red teaming☆43Updated last year
- A utility to inspect, validate, sign and verify machine learning model files.☆56Updated 2 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆52Updated this week
- https://arxiv.org/abs/2412.02776☆52Updated 4 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated last month
- ☆11Updated last year
- A curated list of large language model tools for cybersecurity research.☆449Updated last year
- ☆104Updated 10 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆103Updated 11 months ago