vs-uulm / alekto
Zero Trust Network Framework
☆10Updated 5 years ago
Alternatives and similar repositories for alekto:
Users that are interested in alekto are comparing it to the libraries listed below
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- ☆21Updated last year
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- Botnet Simulation Framework☆78Updated 4 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Static and Dynamic Analysis of Malware Samples☆11Updated 5 years ago
- Import Mitre Att&ck into Neo4j database☆34Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- A Darktrace CLI written in Python☆15Updated 5 years ago
- ☆30Updated 5 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated last year
- This is an open source Snort rules repository☆30Updated 2 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Updated 2 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆13Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Malware and PCAP☆11Updated last year
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆25Updated 3 years ago
- Around the finger, tenderness, wrapped around the world, 24 days ago, ⋅ 3 reading Collect and organize various webshells to do webshell d…☆24Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 10 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- ☆13Updated 2 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆14Updated last year
- Decrypt TLS traffic from a pcap file☆24Updated last year