SaitoLab-Nitech / FirmPot
A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.
☆10Updated 2 years ago
Related projects: ⓘ
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- IoT Security Reading List☆62Updated 4 years ago
- ☆57Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆58Updated 3 years ago
- Yet Another YARA rule Generator☆60Updated 5 years ago
- ☆18Updated 3 years ago
- ☆20Updated 3 months ago
- ICS Cybersecurity PCAP respository☆48Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- A collection of resources for security data☆39Updated 6 years ago
- The IoT honeypot (Master's Thesis)☆9Updated 4 years ago
- Fuzzy Hash calculated from import API of PE files☆87Updated 2 years ago
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆13Updated 5 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 6 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27Updated 5 years ago
- ☆14Updated 7 years ago
- List of (automatic) protocol reverse engineering tools for network protocols☆138Updated 3 months ago
- ☆89Updated 4 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 7 years ago
- ☆16Updated 6 years ago
- DNP3 Cyber-attack datasets☆11Updated 7 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆60Updated 3 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆82Updated 3 months ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆18Updated 7 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆33Updated last month
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆19Updated 2 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆31Updated 4 months ago
- DHCP Fingerprinting☆27Updated 3 years ago