apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆11Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Updated 6 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆118Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- Using Python script instead of Nmap NSE script to detect ICS protocols[根据nmap nse脚本来编写工控协议识别的python脚本]☆33Updated 5 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- Suricata rule and intel index☆33Updated last month
- ☆44Updated 2 years ago
- ☆39Updated last year
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last year
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Go implementation of the Community ID flow hashing standard☆21Updated 6 months ago
- zeek-scripts☆45Updated 6 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 7 months ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 5 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- ☆13Updated 8 years ago
- ☆35Updated last year
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Updated 8 years ago
- goscanner is a tool for large-scale TLS and SSH scans☆31Updated last year
- Community-based CybergON-powered Suricata rules☆12Updated 3 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year