apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆12Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Updated 6 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- zeek-scripts☆45Updated 7 years ago
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 7 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Updated 3 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆160Updated 8 months ago
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- ☆45Updated 3 years ago
- Zeek IDS Dockerfile☆101Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 4 months ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- Suricata rule and intel index☆33Updated last month
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- Application and service identification rules for Suricata☆19Updated 3 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last year
- Go implementation of the Community ID flow hashing standard☆21Updated 8 months ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Core elements of the Modern Honey Network implemented in Docker☆35Updated 3 years ago
- High Interaction Honeypot Solution for Redis protocol☆25Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Import Mitre Att&ck into Neo4j database☆38Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Suricata rules for network anomaly detection☆180Updated 3 weeks ago
- ☆39Updated 2 years ago
- Rule sets for Sagan☆106Updated 4 years ago