RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆12Jul 29, 2019Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Apr 9, 2019Updated 7 years ago
- Honeypot framework for UPnP Device☆15Feb 2, 2019Updated 7 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆26May 10, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Aug 12, 2017Updated 8 years ago
- ☆15Aug 17, 2017Updated 8 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Jan 9, 2020Updated 6 years ago
- ICS protocol traffic generators☆23Oct 25, 2023Updated 2 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆21May 10, 2024Updated 2 years ago
- An airgapped encryption/decryption device for off-grid communication☆10Aug 16, 2023Updated 2 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆17Oct 12, 2022Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆16Jan 2, 2024Updated 2 years ago
- Publish OpenSCAP scan metrics to CloudWatch and optionally send SNS notifications☆19May 3, 2018Updated 8 years ago
- Tool for generating a report from results of oscap scan.☆26Oct 4, 2024Updated last year
- A FFI wrapper around the OpenSCAP library☆16May 24, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 9 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- ☆16Feb 12, 2019Updated 7 years ago
- ☆13Jul 2, 2020Updated 5 years ago
- ☆14Jul 14, 2018Updated 7 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 8 months ago
- GNU Radio module for data encryption using NaCl library☆26Mar 2, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Plot pixels on a 320x200 256c canvas☆11Jan 8, 2024Updated 2 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆11Nov 19, 2024Updated last year
- ☆12Jun 6, 2023Updated 2 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Reinforcement Learning (RL), allows you to develop smart, quick and self-learning systems in your business surroundings. It is an effecti…☆13Sep 25, 2019Updated 6 years ago