apauna / RASSH
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆10Updated 5 years ago
Alternatives and similar repositories for RASSH:
Users that are interested in RASSH are comparing it to the libraries listed below
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 10 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated 5 months ago
- ☆14Updated 7 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆23Updated 5 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆22Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 6 months ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆68Updated 9 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- ☆21Updated last year
- Application and service identification rules for Suricata☆18Updated 2 years ago
- ☆41Updated 2 years ago
- Build a local copy of MITRE ATT&CK and CAPEC. Server mode for easy querying.☆32Updated this week
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- A collection of resources for security data☆40Updated 7 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Botnet Simulation Framework☆78Updated 4 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated last month
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- Suricata rule and intel index☆30Updated 2 months ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Updated 4 years ago
- collect logs and alerts from 27 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Updated last year
- Import Mitre Att&ck into Neo4j database☆34Updated 2 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆32Updated 9 months ago