stratosphereips / VelLMes-AI-Deception-FrameworkLinks
Interactive, dynamic, and realistic LLM honeypots
☆67Updated 9 months ago
Alternatives and similar repositories for VelLMes-AI-Deception-Framework
Users that are interested in VelLMes-AI-Deception-Framework are comparing it to the libraries listed below
Sorting:
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- ☆44Updated 2 years ago
- IoT and Operational Technology Honeypot☆104Updated 2 years ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Updated this week
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆136Updated this week
- Simple Latest CVE Collector Written in Python☆59Updated last year
- ☆19Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated 3 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆91Updated 6 months ago
- PoC and Detection for CVE-2024-21626☆75Updated last year
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆43Updated 3 weeks ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Code for shelLM tool☆56Updated 9 months ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 8 months ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Damn Vulnerable SCA Application☆42Updated last month
- ☆44Updated 3 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆94Updated last year
- Trends Website (URL) from Twitter hackers.☆107Updated this week
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆153Updated 6 months ago
- Source code used at TweetFeed.live☆47Updated 2 years ago
- AutoSpear☆68Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 7 months ago
- shared samples from #dailyphish and/or #apt tweets☆41Updated 2 months ago
- Everything related to YARA☆14Updated 2 months ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆25Updated 7 months ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year