RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot capable of interacting with attackers using Reinforcement Learning. The code is written in Python and it uses the Kippo SSH Honeypot as reference(source) to create an emulated SSH server that interacts with t…
☆12Jul 29, 2019Updated 6 years ago
Alternatives and similar repositories for RASSH
Users that are interested in RASSH are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Apr 9, 2019Updated 7 years ago
- Honeypot framework for UPnP Device☆15Feb 2, 2019Updated 7 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27May 10, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Aug 12, 2017Updated 8 years ago
- ☆15Aug 17, 2017Updated 8 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Jan 9, 2020Updated 6 years ago
- ICS protocol traffic generators☆23Oct 25, 2023Updated 2 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆21May 10, 2024Updated last year
- An airgapped encryption/decryption device for off-grid communication☆10Aug 16, 2023Updated 2 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆17Oct 12, 2022Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Publish OpenSCAP scan metrics to CloudWatch and optionally send SNS notifications☆19May 3, 2018Updated 7 years ago
- A FFI wrapper around the OpenSCAP library☆16May 24, 2023Updated 2 years ago
- Tool for generating a report from results of oscap scan.☆26Oct 4, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 8 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- ☆13Jul 2, 2020Updated 5 years ago
- ☆16Feb 12, 2019Updated 7 years ago
- ☆14Jul 14, 2018Updated 7 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 7 months ago
- GNU Radio module for data encryption using NaCl library☆26Mar 2, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Plot pixels on a 320x200 256c canvas☆11Jan 8, 2024Updated 2 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆12Nov 19, 2024Updated last year
- ☆12Jun 6, 2023Updated 2 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Reinforcement Learning (RL), allows you to develop smart, quick and self-learning systems in your business surroundings. It is an effecti…☆13Sep 25, 2019Updated 6 years ago