ABSllk / CVE_Montior_with_LLMLinks
Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, generates Sops, and automatically generates honeypot scripts to simulate the vulnerability
☆20Updated last year
Alternatives and similar repositories for CVE_Montior_with_LLM
Users that are interested in CVE_Montior_with_LLM are comparing it to the libraries listed below
Sorting:
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆35Updated 4 months ago
- Interactive, dynamic, and realistic LLM honeypots☆71Updated 10 months ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- ☆45Updated 3 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆138Updated this week
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- ☆44Updated 5 months ago
- AutoSpear☆70Updated last year
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆75Updated 2 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 5 years ago
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- ☆16Updated 3 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆101Updated 4 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Updated 2 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆25Updated 2 years ago
- 欺骗防御Linux版本Agent☆13Updated 4 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆59Updated 2 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- Web shell scanner and analyzer.☆113Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- ☆13Updated 4 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- ☆19Updated 4 years ago
- 基于机器学习的Webshell检测工具☆12Updated 2 years ago
- ☆21Updated 3 years ago