An environment for testing AI agents against networks using Metasploit.
☆45Feb 4, 2023Updated 3 years ago
Alternatives and similar repositories for metasploit-gym
Users that are interested in metasploit-gym are comparing it to the libraries listed below
Sorting:
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆56Dec 19, 2024Updated last year
- ☆66Sep 13, 2025Updated 6 months ago
- ☆10May 25, 2023Updated 2 years ago
- micro-gpt in ASM on the Super Nintendo☆49Feb 12, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- A Cybersecurity Generalist LLM (ICLR'26)☆36Feb 9, 2026Updated last month
- Educational guides, writeups and challenges for the 2023 Equinor CTF☆14Mar 13, 2024Updated 2 years ago
- distutils extension module - create an installer by InnoSetup.☆13Jul 28, 2015Updated 10 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- A monitoring hub that watches popular open-source repositories and uses AI to detect when commits are patching security vulnerabilities -…☆82Updated this week
- ☆18May 6, 2023Updated 2 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- ☆12Mar 14, 2022Updated 4 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Jul 27, 2023Updated 2 years ago
- ☆11Jul 17, 2024Updated last year
- HTTP testing platform for security researchers☆21Updated this week
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- This tool lets you prompt ChatGPT from any textbox on your computer using ibus☆10Mar 15, 2023Updated 3 years ago
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆32Jul 6, 2025Updated 8 months ago
- Make inso available in your GitHub Actions workflows☆11Jul 16, 2025Updated 8 months ago
- CompChomper is a framework for measuring how LLMs perform at code completion.☆21Apr 29, 2025Updated 10 months ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆34Mar 6, 2026Updated 2 weeks ago
- A cookiecutter template for creating a new LLM plugin that adds tools to LLM☆29May 27, 2025Updated 9 months ago
- Overworld's local world client interface to run Waypoint world models☆46Updated this week
- S3 Upload plugin for PyUpdater☆12Dec 7, 2021Updated 4 years ago
- ☆10Apr 21, 2025Updated 10 months ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Aug 1, 2018Updated 7 years ago
- The ASF+SDF Meta-Environment is an inter-active IDE for language prototyping, source code analysis and source-to-source transformation. I…☆17Nov 15, 2012Updated 13 years ago
- Micro-agent framework for Caido☆29Sep 4, 2025Updated 6 months ago
- ☆33Mar 7, 2026Updated last week
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Oct 31, 2022Updated 3 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- Copy cat model for Proofpoint☆91Apr 30, 2020Updated 5 years ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,016Feb 6, 2026Updated last month