apauna / RASSHLinks
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆11Updated 5 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below
Sorting:
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆22Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Application and service identification rules for Suricata☆18Updated 2 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 9 months ago
- ☆13Updated 7 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆24Updated 2 years ago
- Suricata rules for SCADA☆14Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Go implementation of the Community ID flow hashing standard☆20Updated 2 months ago
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- ☆43Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆36Updated 2 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Updated 5 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆34Updated 2 months ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆18Updated 11 months ago
- Botnet Simulation Framework☆77Updated 4 years ago
- A repository for OSSEC rules and decoders☆54Updated last year
- Suricata rule and intel index☆31Updated 3 months ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- ☆41Updated 2 years ago