YAWNING-TITAN
Cyber agent simulator
An abstract graph-based simulation environment for training autonomous cyber agents.
YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for autonomous cyber operations.
59 stars
9 watching
17 forks
Language: Python
last commit: 9 months ago autonomous-agentscybersecurityopenai-gymopenai-gym-environmentreinforcement-learningrl-environment
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of pre-built stress simulations for testing Cassandra databases | 4 |
| A tool for simulating and analyzing potential security threats to Microsoft Windows systems using the MITRE ATT&CK framework. | 208 |
| A tool that simulates realistic user behavior to support tradecraft development in lab environments | 393 |
| A tool for simulating human-like behaviors in language models using generative agents | 764 |
| A toolkit for training and backtesting reinforcement learning algorithms in trading environments. | 1,610 |
| Teaching software developers to build intelligent agents using deep reinforcement learning and OpenAI Gym | 374 |
| A PyTorch-based framework for training and studying artificial species in bio-inspired environments | 72 |
| An experimentation platform to investigate the interaction of automated agents in abstract simulated network environments. | 1,670 |
| A framework for simulating and evaluating reinforcement learning from human feedback methods | 786 |
| An open-source multi-agent simulation framework using GPT-4 to explore AI-powered collaboration and task execution | 1,647 |
| An environment for testing AI agents against a simulated network | 171 |
| A Reinforcement Learning project for training an autonomous driving agent in a simulated environment using the Carla game engine | 368 |
| An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,103 |
| A Python-based project simulating a decoy system to detect and analyze malicious activity in computer networks. | 26 |
| An AI training environment for cyber-defence scenarios | 17 |