ABSllk / CVE_Montior_with_LLM
Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, generates Sops, and automatically generates honeypot scripts to simulate the vulnerability
☆18Updated 8 months ago
Alternatives and similar repositories for CVE_Montior_with_LLM:
Users that are interested in CVE_Montior_with_LLM are comparing it to the libraries listed below
- Interactive, dynamic, and realistic LLM honeypots☆38Updated last month
- ☆42Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Updated last year
- 基于机器学习的Webshell检测工具☆10Updated last year
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆32Updated last year
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Updated 3 years ago
- ☆32Updated 4 years ago
- ☆30Updated last year
- CVE-2022-31245: RCE and domain admin privilege escalation for Mailcow☆12Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 2 months ago
- RCE in NPM VSCode Extension☆20Updated 3 years ago
- 不定期更新suricata的检测规则☆11Updated 5 years ago
- Simple WebSocket fuzzer☆32Updated last year
- ATT&CK技战术数据☆16Updated 4 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 11 months ago
- Is this IP a C2 server?☆28Updated 4 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Updated 6 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆71Updated last year
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆21Updated 7 months ago
- 攻击流量包,辅助安全运营/分析人员,HVV蓝队工程师开展流量攻击研判工作☆59Updated last year
- ☆43Updated 3 weeks ago
- The king of shell -Javaweb Memory Shell☆23Updated 2 years ago
- ☆29Updated 4 years ago
- 威胁检测规则集☆15Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Updated 3 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆54Updated last year
- AutoSpear☆60Updated last year
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago