apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆11Updated 5 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆22Updated 6 years ago
- ☆13Updated 7 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago
- Quickly generate suricata rules for IOCs☆29Updated 4 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆18Updated 11 months ago
- Suricata rule and intel index☆31Updated 3 months ago
- ☆43Updated 2 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 2 months ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- Snort rules☆35Updated 6 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆34Updated last year
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆36Updated 2 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- 威胁检测规则集☆15Updated 5 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- High Interaction Honeypot Solution for Redis protocol☆24Updated 4 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆26Updated last year
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- ☆11Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Is this IP a C2 server?☆28Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago