apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆12Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Updated 6 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆161Updated 9 months ago
- Suricata rule and intel index☆33Updated 2 months ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Updated 2 years ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Updated 3 years ago
- Go implementation of the Community ID flow hashing standard☆21Updated 8 months ago
- Core elements of the Modern Honey Network implemented in Docker☆35Updated 3 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- ☆45Updated 3 years ago
- Suricata Verification Tests - Testing Suricata Output☆117Updated 2 weeks ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 7 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Updated 4 years ago
- Using Python script instead of Nmap NSE script to detect ICS protocols[根据nmap nse脚本来编写工控协议识别的python脚本]☆33Updated 5 years ago
- A repository for OSSEC rules and decoders☆54Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated last month
- Zeek IDS Dockerfile☆101Updated 3 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Application and service identification rules for Suricata☆19Updated 3 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 5 months ago
- Suricata rules for network anomaly detection☆180Updated last month
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 8 months ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago