No project description provided
Project description
AIT Cyber Range Kyoushi - Simulation
The Kyoushi Simulation package provides a development API and cli utilities for creating and running state machines. Developed state machines can be executed to automate the simulation of both attacker and normal user behavior in a Cyber Range. Thus facilitating Cyber Range exercises, IDS data set generation and other Cyber Range related tasks.
Check out the Documentation of this package.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file kyoushi-simulation-0.3.10.tar.gz.
File metadata
- Download URL: kyoushi-simulation-0.3.10.tar.gz
- Upload date:
- Size: 24.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.1.7 CPython/3.7.11 Linux/5.8.0-1039-azure
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d9103edc295983f5d6324a19e85c3d5cada2d8b4f35d93f32c7ff130f37d54fa
|
|
| MD5 |
624fed50914e27b64c9334761415a229
|
|
| BLAKE2b-256 |
100901ee58ecfe5b23fe51752aee13f1010362c87e8200df792633a9aedfa666
|
File details
Details for the file kyoushi_simulation-0.3.10-py3-none-any.whl.
File metadata
- Download URL: kyoushi_simulation-0.3.10-py3-none-any.whl
- Upload date:
- Size: 28.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.1.7 CPython/3.7.11 Linux/5.8.0-1039-azure
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
82dd3611a9a41e47ccc745c51ad1e7697fb9acc955a557aebdbdb4e70d48b54c
|
|
| MD5 |
6b37b84c9d5d98aeb6950c9441257933
|
|
| BLAKE2b-256 |
ede9bf7eceb3ceb652f8ab598082408240b783c0253a733d72b719b5a7ff80b0
|