stratosphereips / VelLMes-AI-Deception-FrameworkLinks
Interactive, dynamic, and realistic LLM honeypots
☆73Updated 11 months ago
Alternatives and similar repositories for VelLMes-AI-Deception-Framework
Users that are interested in VelLMes-AI-Deception-Framework are comparing it to the libraries listed below
Sorting:
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- AI 驱动的 SOC 仿真平台☆119Updated last month
- ☆44Updated 3 years ago
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- PyRASP is a Runtime Application Self Protection package for Python-based Web Servers (Flask, FastAPI and Django), Serverless Functions (A…☆33Updated 2 months ago
- Source code used at TweetFeed.live☆48Updated 3 years ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Simple Latest CVE Collector Written in Python☆59Updated last year
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆92Updated 9 months ago
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated 2 years ago
- Code for shelLM tool☆57Updated last year
- shared samples from #dailyphish and/or #apt tweets☆41Updated 5 months ago
- ☆21Updated last year
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆37Updated 6 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 9 months ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated last month
- Trends Website (URL) from Twitter hackers.☆112Updated this week
- ☆44Updated 6 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆47Updated last month
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆43Updated 2 weeks ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- Linux Incident Response Reporting☆83Updated last year
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆110Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Updated last year