apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆11Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆23Updated 6 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆107Updated 4 years ago
- IoT and Operational Technology Honeypot☆103Updated last year
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- ☆43Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated last year
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 5 years ago
- ☆13Updated 8 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆28Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 5 months ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 3 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 5 months ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated last month
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆125Updated last year
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- Automatically exported from code.google.com/p/modscan☆28Updated 10 years ago
- Suricata rule and intel index☆31Updated 2 months ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆115Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 5 years ago
- High Interaction Honeypot Solution for Redis protocol☆24Updated 4 years ago
- Triconex TriStation utilities and tools☆78Updated 6 years ago
- A repository for OSSEC rules and decoders☆55Updated 2 years ago
- A set of ICS IDS rules for use with Suricata.☆50Updated last year
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago