RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆12Jul 29, 2019Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Apr 9, 2019Updated 6 years ago
- Honeypot framework for UPnP Device☆15Feb 2, 2019Updated 7 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 9 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27May 10, 2019Updated 6 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Aug 12, 2017Updated 8 years ago
- ☆15Aug 17, 2017Updated 8 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Jan 9, 2020Updated 6 years ago
- ICS protocol traffic generators☆23Oct 25, 2023Updated 2 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆20May 10, 2024Updated last year
- An airgapped encryption/decryption device for off-grid communication☆10Aug 16, 2023Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆16Oct 12, 2022Updated 3 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Publish OpenSCAP scan metrics to CloudWatch and optionally send SNS notifications☆19May 3, 2018Updated 7 years ago
- A FFI wrapper around the OpenSCAP library☆16May 24, 2023Updated 2 years ago
- Tool for generating a report from results of oscap scan.☆26Oct 4, 2024Updated last year
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 7 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- ☆12Jul 2, 2020Updated 5 years ago
- ☆16Feb 12, 2019Updated 7 years ago
- ☆14Jul 14, 2018Updated 7 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 6 months ago
- GNU Radio module for data encryption using NaCl library☆26Mar 2, 2020Updated 6 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Plot pixels on a 320x200 256c canvas☆11Jan 8, 2024Updated 2 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆12Nov 19, 2024Updated last year
- ☆12Jun 6, 2023Updated 2 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Reinforcement Learning (RL), allows you to develop smart, quick and self-learning systems in your business surroundings. It is an effecti…☆12Sep 25, 2019Updated 6 years ago