apauna / RASSH
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆11Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for RASSH
- The IoT honeypot (Master's Thesis)☆9Updated 5 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆22Updated 5 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆66Updated 6 months ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆20Updated last year
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last month
- ssdeep cluster analysis for malware files☆29Updated 4 years ago
- ☆15Updated 7 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Go implementation of the Community ID flow hashing standard☆19Updated 2 months ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆22Updated 3 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆42Updated 7 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated last year
- Import Mitre Att&ck into Neo4j database☆33Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆11Updated 3 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 6 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 6 years ago
- Ender of Fast-Flux malicious domains.☆26Updated 10 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 3 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆12Updated 3 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆38Updated 4 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Updated 7 months ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 3 years ago
- ☆39Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆69Updated 4 months ago
- ☆42Updated last year