stratosphereips / VelLMes-AI-Deception-FrameworkLinks
Interactive, dynamic, and realistic LLM honeypots
☆56Updated 5 months ago
Alternatives and similar repositories for VelLMes-AI-Deception-Framework
Users that are interested in VelLMes-AI-Deception-Framework are comparing it to the libraries listed below
Sorting:
- Simple Latest CVE Collector Written in Python☆59Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- IoT and Operational Technology Honeypot☆103Updated last year
- ☆43Updated 2 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆58Updated 2 years ago
- Damn Vulnerable SCA Application☆39Updated 3 weeks ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- ☆19Updated last year
- Secrets scanner that understands code☆149Updated 5 months ago
- Source code used at TweetFeed.live☆44Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆126Updated 2 months ago
- All-in-one offensive security toolbox with AI agent and MCP architecture. Integrates tools like Nmap, Metasploit, FFUF, SQLMap. Enables p…☆93Updated 2 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated 2 weeks ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- PowerShell Script Analyzer☆70Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆137Updated this week
- CVE-2025-1974☆89Updated 4 months ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆17Updated last week
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆42Updated last year
- Memory Scaner☆63Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Trends Website (URL) from Twitter hackers.☆98Updated this week
- ☆44Updated 2 weeks ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 4 months ago
- shared samples from #dailyphish and/or #apt tweets☆41Updated last week
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆39Updated last month
- AutoSpear☆63Updated last year
- ☆98Updated 3 years ago
- ShellSweeping the evil.☆176Updated 8 months ago