apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆11Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- IoT and Operational Technology Honeypot☆103Updated last year
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆23Updated 6 years ago
- ☆43Updated 2 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 4 months ago
- A Go implementation of JARM☆119Updated 3 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆107Updated 4 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆157Updated 5 months ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆115Updated 2 years ago
- Suricata rule and intel index☆31Updated last month
- Import Mitre Att&ck into Neo4j database☆37Updated 2 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Collect autorun records from running system☆60Updated 3 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 3 weeks ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- ☆25Updated 4 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 11 months ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 5 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆111Updated last year
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆39Updated 3 years ago