Interactive, dynamic, and realistic LLM honeypots
☆73Feb 18, 2025Updated last year
Alternatives and similar repositories for VelLMes-AI-Deception-Framework
Users that are interested in VelLMes-AI-Deception-Framework are comparing it to the libraries listed below
Sorting:
- Code for shelLM tool☆57Jan 28, 2025Updated last year
- ☆55Updated this week
- Galah: An LLM-powered web honeypot.☆635Jul 24, 2025Updated 7 months ago
- [NAACL 2025] LLM-Supported Natural Language to Bash Translation☆16Jul 17, 2025Updated 7 months ago
- ☆10Jul 9, 2020Updated 5 years ago
- HL7 / FHIR honeypot☆26May 20, 2024Updated last year
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆12Jan 15, 2022Updated 4 years ago
- DICOM Honeypot☆27Dec 5, 2025Updated 3 months ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- FuzzBuilderEx is a system to build seed corpus and fuzzing executables using the test framework automatically.☆14Sep 6, 2022Updated 3 years ago
- Honeynet Project Static Site☆19Feb 16, 2026Updated 2 weeks ago
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 2 years ago
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- ☆14Dec 10, 2021Updated 4 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- ☆14Jun 21, 2020Updated 5 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- Formalization of Typed Assembly Language (TAL) in Coq☆18Mar 11, 2024Updated last year
- GenCoG: A DSL-Based Approach to Generating Computation Graphs for TVM Testing (ISSTA‘23)☆17Jul 19, 2023Updated 2 years ago
- A DICOM honeypot for detecting and logging unauthorized access attempts☆52Updated this week
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆18May 2, 2024Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Jan 13, 2024Updated 2 years ago
- Generic Low Interaction Honeypot☆296Dec 31, 2025Updated 2 months ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- ☆22Sep 28, 2022Updated 3 years ago
- This is the artifact for paper “Are Machine Learning Cloud APIs Used Correctly? (#421)” in ICSE2021☆16Feb 27, 2021Updated 5 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ☆16Updated this week
- 利用 360 每天公开的 恶意DGA 域名信息 http://data.netlab.360.com/feeds/dga/dga.txt ,通过分析 wireshark 抓到的 pcap文件,去匹配相应的 DNS 请求,试图发现内网受感染的地址☆20May 24, 2018Updated 7 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Mar 4, 2023Updated 3 years ago
- ☆18Sep 2, 2025Updated 6 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆275Jun 13, 2025Updated 8 months ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Nov 27, 2021Updated 4 years ago