apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆10Updated 5 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆22Updated 6 years ago
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- ☆43Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆80Updated 9 months ago
- IoT and Operational Technology Honeypot☆104Updated last year
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 8 months ago
- Snort rules☆35Updated 6 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated last month
- Import Mitre Att&ck into Neo4j database☆36Updated 2 years ago
- How to Zeek Sysmon Logs!☆101Updated 3 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 7 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- ☆12Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- ☆41Updated 2 years ago
- A set of ICS IDS rules for use with Suricata.☆50Updated last year
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Updated 3 years ago