vs-uulm / alektoLinks
Zero Trust Network Framework
☆10Updated 5 years ago
Alternatives and similar repositories for alekto
Users that are interested in alekto are comparing it to the libraries listed below
Sorting:
- ☆22Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- ☆11Updated 3 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Updated 7 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 8 months ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Software Defined Perimeter using readily available Open Source components☆11Updated 6 years ago
- Dynamic Malware Analsysis Sandbox☆17Updated 3 weeks ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆34Updated 2 months ago
- ☆13Updated 2 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆24Updated 6 years ago
- A collection of resources for security data☆41Updated 7 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆27Updated 4 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated 2 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Updated 2 years ago
- A CALDERA Plugin Template☆19Updated last year
- Malware and PCAP☆11Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆14Updated 2 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Updated 2 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆11Updated 5 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆16Updated 2 years ago
- A research project to crawl and analyze Top 1 million domains☆18Updated 2 years ago