wumingruiye's Stars
eldraco/theinfinitewebpage
This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when it automatically tries to download it.
jkhollandjr/reinforcement_learning_wf
Attempts to create a website fingerprinting defense using reinforcement learning
amirSayyafan/Q-learning
A model free reinforcement learning algorithm for detect and defense task in a smart power system
Wan-ZL/Foureye-2-simulation
Multi-attacker, IRS, node recovery
Wan-ZL/ARO-Foureye
This is a project funded by US Army Research Office (W91NF-2020140). In this project, we develop a hypergame-theoretic defensive deception framework for tactical networks characterized by severe resource constraints, high operational tempo, or high hostility based on the learning and subjective beliefs of attackers and a defender.
dfki-in-sec/SCANTRAP
WordPress Security Plugin
lab-v2/pyreason-gym
An OpenAI wrapper for PyReason to use in a Grid World reinforcement learning setting
lab-v2/pyreason
An explainable inference software supporting annotated, real valued, graph based and temporal logic
Night-jmp/deceptiport
Cyber-deception tool used to detect and block reconnaissance and enumeration attempts
ypy02784/baselines
OpenAI Baselines: high-quality implementations of reinforcement learning algorithms
ypy02784/gym
A toolkit for developing and comparing reinforcement learning algorithms.
ypy02784/OVAL
Official repository for the Open Vulnerability and Assessment Language
kurbster/Cyber-Deception
Cyber-Deception/capstone-algorithm
python code for the capstone cyber inception/deception algorithm. Port numbers have been noted on where they should be passed into on miniMax.py and networkManager.py
ZedUnknown/Cyber-Deception-Tools
Welcome to the Cyber Deception Tools. This repository provides a range of open-source tools designed to enhance cybersecurity strategies by incorporating deception techniques. These tools aim to mislead and confuse potential attackers, offering valuable insights into their tactics and intentions.
shramos/Awesome-Cybersecurity-Datasets
A curated list of amazingly awesome Cybersecurity datasets
aliasrobotics/RVD
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
vmayoral/Nettacker
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
vmayoral/basic_reinforcement_learning
An introductory series to Reinforcement Learning (RL) with comprehensive step-by-step tutorials.
vmayoral/PentestGPT
A GPT-empowered penetration testing tool
Shulong98/GAIL-PT
Kheoss/AGIAS
Attack Graph Interpretability AnalySis: Quick tool to analyse attack graphs's interpretability
purseclab/ATLAS
ATLAS: A Sequence-based Learning Approach for Attack Investigation
fhightower/ioc-finder
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
vlegoy/rcATT
A python app to predict Att&ck tactics and techniques from cyber threat reports
shellphish/ictf-framework
The iCTF Framework, presented by Shellphish!
LinyangLee/BERT-Attack
Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT
sf197/nuclei_gpt
Chat automates Nuclei template generation
snazari/MARL-Papers
Paper list of multi-agent reinforcement learning (MARL)
snazari/reinforcement-learning
Implementation of Reinforcement Learning Algorithms. Python, OpenAI Gym, Tensorflow. Exercises and Solutions to accompany Sutton's Book and David Silver's course.