RL4RedTeam
Penetration tester
An agent trained to scan for vulnerabilities and exploit them in a simulated network environment
A PPO agent leveraging reinforcement learning performs Penetration Testing in a simulated computer network environment. The agent is trained to scan for vulnerabilities in the network and exploit them to gain access to various network resources.
23 stars
1 watching
4 forks
Language: Python
last commit: almost 2 years ago nasimpenetration-testingproximal-policy-optimizationpytorchreinforcement-learningreinforcement-learning-agent
Related projects:
Repository | Description | Stars |
---|---|---|
| A framework for training reinforcement learning agents to generalize in novel penetration-testing scenarios | 33 |
| A framework for training Reinforcement Learning agents in simulated network environments for penetration testing purposes. | 23 |
| An automated penetration testing framework using Deep Reinforcement Learning to determine attack paths and execute simulated attacks on networks. | 342 |
| A virtual network environment for learning penetration testing with pre-configured systems and tools. | 841 |
| A comprehensive web application penetration testing framework with modules for reconnaissance, enumeration, and vulnerability analysis. | 1,787 |
| A tool to test the vulnerability of machine learning models to adversarial attacks | 562 |
| A tool that uses web fuzzing and content discovery techniques to test websites for vulnerabilities | 530 |
| A tool designed to facilitate the collection of information on Windows systems during a penetration test | 0 |
| A cheat sheet and resource collection for learning and practicing penetration testing and exploit development | 795 |
| Teaches penetration testing and cybersecurity techniques using machine learning | 358 |
| An extension for a web application security testing tool that identifies vulnerabilities and exploits HTTP requests for penetration testing. | 355 |
| A collection of Python scripts designed to simulate various phases of a cyber attack during a pen test or red team assessment. | 175 |
| Automates known techniques to steal and collect sensitive data from Kubernetes clusters | 1,253 |
| Scans for vulnerable 3rd-party web applications on a network | 570 |