stratosphereips / VelLMes-AI-Deception-FrameworkLinks
Interactive, dynamic, and realistic LLM honeypots
☆71Updated 10 months ago
Alternatives and similar repositories for VelLMes-AI-Deception-Framework
Users that are interested in VelLMes-AI-Deception-Framework are comparing it to the libraries listed below
Sorting:
- Source code used at TweetFeed.live☆47Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆138Updated this week
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆43Updated last week
- ☆45Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- Code for shelLM tool☆57Updated 11 months ago
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- Autonomous Assumed Breach Penetration-Testing Active Directory Networks☆31Updated last week
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆156Updated 7 months ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆59Updated 2 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆35Updated 5 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- ☆19Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- ShellSweeping the evil.☆181Updated last year
- JA4TScan is an active TCP server fingerprinting tool.☆99Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 8 months ago
- Trends Website (URL) from Twitter hackers.☆110Updated this week
- shared samples from #dailyphish and/or #apt tweets☆41Updated 3 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆54Updated 4 months ago
- ☆33Updated 2 months ago
- An Adaptive Misuse Detection System☆46Updated last year
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 8 months ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 2 weeks ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated last month
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 6 months ago