stratosphereips / VelLMes-AI-Deception-FrameworkLinks
Interactive, dynamic, and realistic LLM honeypots
☆71Updated 11 months ago
Alternatives and similar repositories for VelLMes-AI-Deception-Framework
Users that are interested in VelLMes-AI-Deception-Framework are comparing it to the libraries listed below
Sorting:
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- AI 驱动的 SOC 仿真平台☆106Updated 2 weeks ago
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated last week
- Simple Latest CVE Collector Written in Python☆59Updated last year
- ☆44Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Source code used at TweetFeed.live☆48Updated 3 years ago
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆43Updated last month
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated last month
- ☆21Updated last year
- Code for shelLM tool☆57Updated 11 months ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- PoC and Detection for CVE-2024-21626☆75Updated last year
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated 2 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆40Updated last week
- Damn Vulnerable SCA Application☆43Updated 2 weeks ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 5 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆55Updated 4 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆102Updated last year
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Updated 2 months ago
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Updated 2 years ago
- KeyTrap (DNSSEC)☆44Updated last year
- ☆139Updated 2 weeks ago
- CVE-2025-1974☆90Updated 9 months ago
- AI Powered Sensitive Information Detection☆20Updated last year
- shared samples from #dailyphish and/or #apt tweets☆41Updated 4 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆59Updated last year
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆46Updated 3 weeks ago