aau-network-security / riotpotLinks
IoT and Operational Technology Honeypot
☆104Updated last year
Alternatives and similar repositories for riotpot
Users that are interested in riotpot are comparing it to the libraries listed below
Sorting:
- ☆43Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated 2 months ago
- ☆95Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆81Updated last month
- A forensic evidence acquirer☆86Updated 4 years ago
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆99Updated 4 years ago
- Botnet Simulation Framework☆78Updated 4 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated 10 months ago
- simple YARA-based IOC scanner☆169Updated 3 months ago
- volatility explorer☆90Updated 4 years ago
- Interactive, dynamic, and realistic LLM honeypots☆51Updated 3 months ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated 2 weeks ago
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- ☆31Updated 6 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)☆171Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆248Updated 2 years ago
- Suricata rules for network anomaly detection☆164Updated last month
- Core A2P2V functionality (command line based)☆68Updated last year