apauna / RASSH
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆10Updated 5 years ago
Alternatives and similar repositories for RASSH:
Users that are interested in RASSH are comparing it to the libraries listed below
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- ☆14Updated 7 years ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated this week
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 8 months ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆32Updated 4 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 6 years ago
- ☆41Updated 2 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 4 months ago
- A set of ICS IDS rules for use with Suricata.☆49Updated last year
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆67Updated 8 months ago
- IoT and Operational Technology Honeypot☆105Updated last year
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆22Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Updated 10 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆66Updated this week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- ☆21Updated 3 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- Honeypot framework for UPnP Device☆14Updated 5 years ago