HalfDeadPie / SIoTpotLinks
The IoT honeypot (Master's Thesis)
☆8Updated 5 years ago
Alternatives and similar repositories for SIoTpot
Users that are interested in SIoTpot are comparing it to the libraries listed below
Sorting:
- ☆13Updated 7 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 9 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆26Updated 6 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- Triconex TriStation utilities and tools☆75Updated 6 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆78Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- malware-traffic-analysis.net PCAPs repository.☆38Updated 9 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated 11 months ago
- A set of ICS IDS rules for use with Suricata.☆50Updated last year
- Yet Another YARA rule Generator☆63Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 9 years ago
- Snort rules☆35Updated 6 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆123Updated last year
- ☆79Updated 2 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- Modbus VCR☆27Updated 7 years ago
- Tools to interact with APTnotes reporting/index.☆103Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆82Updated 5 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago