Code for shelLM tool
☆58Jan 28, 2025Updated last year
Alternatives and similar repositories for shelLM
Users that are interested in shelLM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive, dynamic, and realistic LLM honeypots☆76Feb 18, 2025Updated last year
- DICOM Honeypot☆28Apr 25, 2026Updated last week
- ☆57Apr 27, 2026Updated last week
- ☆15Jun 7, 2024Updated last year
- This is a honeypot for IP camera☆19Jul 10, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- IP Cam Honeypot☆20Feb 28, 2024Updated 2 years ago
- SSH Multipot☆24Apr 30, 2018Updated 8 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 7 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- catch log4j exploits in the wild? maybe if we're lucky... .☆16Aug 14, 2023Updated 2 years ago
- A DICOM honeypot for detecting and logging unauthorized access attempts☆57Apr 16, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Example configuration Beelzebub honeypot 🚀☆22Jun 26, 2025Updated 10 months ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆64Dec 27, 2020Updated 5 years ago
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆32Nov 13, 2024Updated last year
- ☆16Mar 20, 2026Updated last month
- Freki is a tool to manipulate packets in usermode using NFQUEUE and golang.☆59Feb 2, 2023Updated 3 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Study material (slides, documents, labs, etc) for the "Web Applications I" and "Applicazioni Web I" courses (Politecnico di Torino, 2022/…☆21May 31, 2023Updated 2 years ago
- This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when it…☆21Apr 7, 2015Updated 11 years ago
- HL7 / FHIR honeypot☆27May 20, 2024Updated last year
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- This is a python script to generate nice bibtex file for latex.☆19Mar 1, 2020Updated 6 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collection of Jupyter notebooks☆13Mar 11, 2021Updated 5 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Nov 23, 2018Updated 7 years ago
- IoT and Operational Technology Honeypot☆105Oct 7, 2023Updated 2 years ago
- Web Application for domain name monitoring / alerting☆66Aug 1, 2024Updated last year
- Hfinger - fingerprinting HTTP requests☆142May 16, 2023Updated 2 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆17Aug 6, 2025Updated 9 months ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year