vs-uulm / alektoLinks
Zero Trust Network Framework
☆10Updated 6 years ago
Alternatives and similar repositories for alekto
Users that are interested in alekto are comparing it to the libraries listed below
Sorting:
- Botnet Simulation Framework☆77Updated 5 years ago
- ☆21Updated last year
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Updated 2 years ago
- An Intrusion Detection System written in Python☆27Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- ☆13Updated 3 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Updated 7 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Updated 5 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated last week
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Updated 8 years ago
- A collaborative, multi-platform, red teaming framework☆14Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆32Updated 4 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated 10 months ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Updated 6 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Updated 2 years ago
- Decrypt TLS traffic from a pcap file☆28Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 7 months ago
- Public Code for ICS Evasion Attack Generation☆44Updated 4 years ago
- Awesome Cyber-Security Data-sets Collection☆22Updated 7 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 5 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Updated 3 years ago