apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆12Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- Go implementation of the Community ID flow hashing standard☆21Updated 9 months ago
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- ☆44Updated 3 years ago
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Updated 3 weeks ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated last year
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 6 months ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Updated 6 years ago
- zeek-scripts☆45Updated 7 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- A set of ICS IDS rules for use with Suricata.☆51Updated 2 years ago
- Build a local copy of MITRE ATT&CK and CAPEC. Server mode for easy querying.☆34Updated this week
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated last month
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆162Updated 10 months ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 5 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Updated 7 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Zeek IDS Dockerfile☆101Updated 3 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- Automatically exported from code.google.com/p/modscan☆29Updated 10 years ago
- Triconex TriStation utilities and tools☆80Updated 7 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 8 years ago
- Core elements of the Modern Honey Network implemented in Docker☆35Updated 3 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Updated 3 years ago