vs-uulm / alektoLinks
Zero Trust Network Framework
☆10Updated 6 years ago
Alternatives and similar repositories for alekto
Users that are interested in alekto are comparing it to the libraries listed below
Sorting:
- Botnet Simulation Framework☆78Updated 5 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Updated 3 years ago
- ☆21Updated 2 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Updated 4 years ago
- Script fingerprinting systems based on shodan.io data☆12Updated 7 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- ☆13Updated 3 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 8 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Updated 6 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆30Updated 3 weeks ago
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- Public Code for ICS Evasion Attack Generation☆44Updated 4 years ago
- tshark + ELK analytics virtual machine☆68Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 9 months ago
- A collection of resources for security data☆41Updated 8 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Updated 5 years ago
- Awesome Cyber-Security Data-sets Collection☆22Updated 7 years ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆25Updated 7 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Updated 4 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Updated 8 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Updated 6 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated 2 years ago
- ☆68Updated 7 years ago