stratosphereips / VelLMes-AI-Deception-FrameworkLinks
Interactive, dynamic, and realistic LLM honeypots
☆69Updated 9 months ago
Alternatives and similar repositories for VelLMes-AI-Deception-Framework
Users that are interested in VelLMes-AI-Deception-Framework are comparing it to the libraries listed below
Sorting:
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- ☆19Updated last year
- ☆45Updated 3 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- Code for shelLM tool☆57Updated 10 months ago
- Source code used at TweetFeed.live☆47Updated 3 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆59Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆155Updated 6 months ago
- JA4TScan is an active TCP server fingerprinting tool.☆96Updated last year
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- IoT and Operational Technology Honeypot☆106Updated 2 years ago
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆43Updated this week
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆138Updated last week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 7 months ago
- An Adaptive Misuse Detection System☆45Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 4 months ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- shared samples from #dailyphish and/or #apt tweets☆40Updated 3 months ago
- Signature based honeypot detector tool written in Golang☆107Updated 8 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 6 months ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Updated 3 weeks ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆58Updated 8 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 7 months ago
- Trends Website (URL) from Twitter hackers.☆108Updated last week
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated 3 weeks ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- pyJARM is a library for doing JARM fingerprinting using python