vs-uulm / alekto
Zero Trust Network Framework
☆10Updated 5 years ago
Alternatives and similar repositories for alekto
Users that are interested in alekto are comparing it to the libraries listed below
Sorting:
- ☆22Updated last year
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 7 months ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- ☆13Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- Botnet Simulation Framework☆78Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆41Updated 9 months ago
- ☆30Updated 6 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Static and Dynamic Analysis of Malware Samples☆12Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 weeks ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆16Updated 5 years ago
- ModbusTCP Fuzzing and DoS Tool.☆10Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆27Updated 3 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Updated 2 years ago
- A large-scale database of malicious software images☆47Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Malware Machine Learning☆27Updated 7 years ago
- ☆14Updated 2 months ago
- A collaborative, multi-platform, red teaming framework☆14Updated 5 years ago
- A Python 3 library to interact with VirusShare API v2.☆16Updated 4 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- A Darktrace CLI written in Python☆15Updated 5 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year