apauna / RASSH
RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆10Updated 5 years ago
Alternatives and similar repositories for RASSH:
Users that are interested in RASSH are comparing it to the libraries listed below
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- ☆12Updated 7 years ago
- ☆42Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 11 months ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- Suricata rule and intel index☆30Updated last week
- ☆22Updated 4 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆23Updated 2 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated 10 months ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated 6 months ago
- Mapping NSM rules to MITRE ATT&CK☆70Updated 4 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆33Updated 10 months ago
- Import Mitre Att&ck into Neo4j database☆35Updated 2 years ago
- Quickly generate suricata rules for IOCs☆28Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 7 months ago
- A Yara Lua output script for Suricata☆19Updated 5 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Application and service identification rules for Suricata☆18Updated 2 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago