apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆11Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆83Updated this week
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆105Updated 4 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 10 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆156Updated 4 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆83Updated 3 months ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆23Updated 6 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Suricata rules for network anomaly detection☆167Updated 3 months ago
- ☆43Updated 2 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 3 months ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆27Updated 2 years ago
- JA3 TLS Fingerprint database☆79Updated 5 years ago
- IoT and Operational Technology Honeypot☆103Updated last year
- This is an open source Snort rules repository☆30Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- zeek-scripts☆44Updated 6 years ago
- ☆41Updated 2 years ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆37Updated 2 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆112Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago