vmayoral/ExploitFlow

A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.

29
/ 100
Experimental

This library helps cybersecurity researchers and AI developers model potential attack paths through a system. It takes individual cybersecurity actions (like reconnaissance or privilege escalation) and stitches them together to simulate an 'exploit flow' or route. The output is a sequence of actions that represent a potential attack chain, which can be used to test and improve system defenses or develop AI agents for offensive or defensive cybersecurity.

No commits in the last 6 months.

Use this if you are a cybersecurity researcher or AI developer working on game theory or AI applications in cybersecurity and need to programmatically build, combine, and analyze potential exploitation routes.

Not ideal if you are looking for an exploitation framework to directly execute exploits against a system or a database of pre-built exploits.

cybersecurity-research attack-path-modeling game-theory-cybersecurity AI-cybersecurity penetration-testing-simulation
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 7 / 25
Maturity 16 / 25
Community 6 / 25

How are scores calculated?

Stars

37

Forks

2

Language

Python

License

Apache-2.0

Category

ai-red-teaming

Last pushed

Jul 27, 2023

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/vmayoral/ExploitFlow"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.