This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.
☆43Jan 25, 2026Updated last month
Alternatives and similar repositories for Aurora-demos
Users that are interested in Aurora-demos are comparing it to the libraries listed below
Sorting:
- ☆32Jul 21, 2025Updated 7 months ago
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Vindicator is a lightweight Golang library that is designed to hold and check any blocking function. e.g. subprocess, network connection.…☆19Sep 24, 2022Updated 3 years ago
- ☆86Mar 29, 2023Updated 2 years ago
- ☆22Jul 25, 2024Updated last year
- ☆24Apr 17, 2020Updated 5 years ago
- ☆103Aug 23, 2023Updated 2 years ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆146Apr 7, 2025Updated 11 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- ☆27Aug 10, 2023Updated 2 years ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- ☆75Feb 15, 2025Updated last year
- ☆28Oct 21, 2020Updated 5 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- ☆87Feb 24, 2025Updated last year
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- OCR-APT: Reconstructing APT Stories through Subgraph Anomaly Detection and LLMs.☆26Feb 3, 2026Updated last month
- A framework for building provenance-based intrusion detection systems with neural networks☆75Mar 3, 2026Updated last week
- Switch between two running operating systems without losing their state.☆53Jan 2, 2026Updated 2 months ago
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- Algorithms & Data Structures Course. MIPT.☆12Sep 26, 2025Updated 5 months ago
- Dynamic mode decomposition in Python☆13Jun 9, 2015Updated 10 years ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago
- Course Projects for Stanford CS142 Web Applications☆10Oct 15, 2016Updated 9 years ago
- Deep Generative Models course, 2025☆11Jun 5, 2025Updated 9 months ago
- Alcatel-Lucent SR/OS (TiMOS) Firmware Packer☆11May 31, 2017Updated 8 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Nov 21, 2020Updated 5 years ago
- 记录代码审计学习的过程,附含源码☆11Jan 18, 2021Updated 5 years ago
- ☆10Feb 23, 2024Updated 2 years ago
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated last month
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- DiAne is a smart fuzzer for IoT devices☆42Apr 3, 2024Updated last year
- ☆14Feb 26, 2025Updated last year
- ☆43Jul 6, 2023Updated 2 years ago
- A Graph Rewriting Tool for Plot Generation, uses Graph Grammars☆11Mar 3, 2014Updated 12 years ago