apauna / RASSH
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆10Updated 5 years ago
Alternatives and similar repositories for RASSH:
Users that are interested in RASSH are comparing it to the libraries listed below
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆23Updated 2 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated 10 months ago
- ☆12Updated 7 years ago
- Honeypot framework for UPnP Device☆12Updated 6 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆18Updated 8 months ago
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 11 months ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- ☆42Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- IoT and Operational Technology Honeypot☆105Updated last year
- Go implementation of the Community ID flow hashing standard☆20Updated 3 weeks ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated 11 months ago
- Build a local copy of MITRE ATT&CK and CAPEC. Server mode for easy querying.☆32Updated this week
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆23Updated 5 months ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Automatically exported from code.google.com/p/modscan☆27Updated 9 years ago
- Suricata rules for SCADA☆14Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 11 months ago
- ssdeep cluster analysis for malware files☆30Updated 4 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago