SaitoLab-Nitech / FirmPotLinks
A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.
☆10Updated 3 years ago
Alternatives and similar repositories for FirmPot
Users that are interested in FirmPot are comparing it to the libraries listed below
Sorting:
- ☆28Updated 2 weeks ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 9 years ago
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆13Updated 6 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated last year
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆66Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆67Updated 4 years ago
- DNP3 Cyber-attack datasets☆12Updated 8 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- ☆59Updated 4 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- IoT Security Reading List☆62Updated 5 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆17Updated 3 years ago
- Yet Another YARA rule Generator☆63Updated 6 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆165Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 2 years ago
- ☆18Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- ☆16Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 10 months ago
- MABEL: Malware Analysis Benchmark for Artificial Intelligence and Machine Learning☆27Updated 2 months ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆45Updated last year
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆11Updated 5 years ago
- ☆13Updated 7 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆36Updated 6 months ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆34Updated last year
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago