SaitoLab-Nitech / FirmPotLinks
A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.
☆10Updated 3 years ago
Alternatives and similar repositories for FirmPot
Users that are interested in FirmPot are comparing it to the libraries listed below
Sorting:
- ☆29Updated 3 weeks ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆33Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆74Updated 3 weeks ago
- ☆61Updated 4 years ago
- MABEL: Malware Analysis Benchmark for Artificial Intelligence and Machine Learning☆29Updated 2 weeks ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆171Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 3 weeks ago
- ☆16Updated 7 years ago
- Yet Another YARA rule Generator☆64Updated 7 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆81Updated 3 weeks ago
- Conferences, tools, papers, etc.☆44Updated last month
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆24Updated 8 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 10 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- Exploit, Malware and Vulnerability Scoring Application☆15Updated 2 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆93Updated 2 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Automatically exported from code.google.com/p/modscan☆28Updated 10 years ago
- A FUSE module to mount captured network data☆41Updated 4 months ago
- DHCP Fingerprinting☆29Updated 4 years ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆98Updated last year
- CITL's static analysis engine for native code artifacts☆20Updated 4 years ago
- IoT Security Reading List☆63Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 2 months ago
- Symbol hash for ELF files☆112Updated 3 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆25Updated 3 years ago