vs-uulm / alektoLinks
Zero Trust Network Framework
☆10Updated 6 years ago
Alternatives and similar repositories for alekto
Users that are interested in alekto are comparing it to the libraries listed below
Sorting:
- Botnet Simulation Framework☆77Updated 5 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Updated 3 years ago
- ☆21Updated last year
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆32Updated 4 years ago
- ☆13Updated 3 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 3 weeks ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Updated 3 years ago
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Updated 6 years ago
- A curated list of awesome malware analysis tools and resources☆15Updated 7 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Updated 4 years ago
- Public Code for ICS Evasion Attack Generation☆44Updated 4 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Updated 7 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Updated 8 years ago
- Script fingerprinting systems based on shodan.io data☆13Updated 7 years ago
- A Darktrace CLI written in Python☆16Updated 6 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- HoneyDB Python Module☆14Updated last year
- VoIP honeypot system☆21Updated last year