stratosphereips / NetSecGame
An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo project
☆44Updated last week
Alternatives and similar repositories for NetSecGame:
Users that are interested in NetSecGame are comparing it to the libraries listed below
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆64Updated 11 months ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆35Updated 7 months ago
- A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trai…☆26Updated 3 weeks ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆103Updated 11 months ago
- Code for shelLM tool☆51Updated 2 months ago
- An environment for testing AI pentesting agents against a simulated network.☆187Updated last year
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆14Updated 3 weeks ago
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆32Updated 4 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆46Updated 7 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆124Updated last month
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆32Updated 4 months ago
- ☆13Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆23Updated last year
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆23Updated last year
- ☆105Updated 4 years ago
- ATLAS tactics, techniques, and case studies data☆63Updated last month
- Cyber Operations Research Gym☆77Updated 10 months ago
- ☆48Updated last month
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated this week
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆88Updated 9 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆65Updated 2 weeks ago
- Multi-Agent Reinforcement Learning on network-security☆19Updated 3 years ago
- ☆14Updated 3 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 4 months ago
- ☆22Updated 3 years ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 5 months ago
- A Simulated Optimal Intrusion Response Game☆21Updated 3 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year