vs-uulm / alekto
Zero Trust Network Framework
β10Updated 5 years ago
Related projects β
Alternatives and complementary repositories for alekto
- β21Updated 10 months ago
- π "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windowβ¦β19Updated 9 months ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscanβ29Updated last month
- A Linux/Windows Ransomware PoC written in Python, Go and Cβ16Updated last year
- β13Updated last year
- Defense from the 2020 Microsoft Evasion Competitionβ16Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contrβ¦β11Updated 3 years ago
- A curated list of awesome malware analysis tools and resourcesβ14Updated 6 years ago
- IoT Malware Similarity Analysis Platformβ44Updated 2 years ago
- Adversarial Malware Generator Using GANsβ52Updated 3 months ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).β14Updated 7 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)β21Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.β38Updated 3 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactivelyβ22Updated 3 years ago
- A Scrapy-based crawler for crawling Exploit Databaseβ12Updated 5 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.β13Updated 3 years ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.β30Updated 3 years ago
- Botnet Simulation Frameworkβ75Updated 4 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomicsβ34Updated 4 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attacβ¦β24Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commuβ¦β16Updated last year
- β19Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploitsβ15Updated 5 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.β17Updated 4 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container securityβ13Updated last year
- Decrypt TLS traffic from a pcap fileβ23Updated last year
- A Knowledge Graph for Open Source Security Toolsβ15Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware trafficβ38Updated 3 months ago
- Repository collecting and automagically processing public threat intelligence reports.β18Updated 4 years ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"β26Updated last year