vs-uulm / alekto
Zero Trust Network Framework
☆10Updated 5 years ago
Alternatives and similar repositories for alekto:
Users that are interested in alekto are comparing it to the libraries listed below
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14Updated 3 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Updated 2 years ago
- ☆21Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Passive-Recursive DNS daemon☆26Updated 7 months ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆15Updated 8 years ago
- ☆13Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16Updated last year
- A curated list of awesome malware analysis tools and resources☆14Updated 7 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆23Updated 5 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Malware and PCAP☆11Updated last year
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 6 months ago
- A Darktrace CLI written in Python☆15Updated 5 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated last week
- Script fingerprinting systems based on shodan.io data☆13Updated 6 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- suricata rules to pcap☆9Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Public exploits☆14Updated 6 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 11 months ago