vs-uulm / alekto
Zero Trust Network Framework
☆10Updated 4 years ago
Related projects: ⓘ
- ☆21Updated 8 months ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year
- A curated list of awesome malware analysis tools and resources☆14Updated 6 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- ☆13Updated last year
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆16Updated 7 months ago
- Awesome Cyber-Security Data-sets Collection☆18Updated 6 years ago
- A Python 3 library to interact with VirusShare API v2.☆13Updated 4 years ago
- ☆18Updated 3 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated last month
- Adversarial Malware Generator Using GANs☆49Updated last month
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆11Updated 3 years ago
- A collection of resources for security data☆39Updated 6 years ago
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆19Updated 2 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆46Updated 7 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆37Updated 8 months ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆13Updated last year
- The Attacker IP Prioritizer(AIP) algorithm is a python program designed to dynamically generate a resource-friendly IPv4 address blacklis…☆30Updated 10 months ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆27Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Updated 7 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year
- A logic-based enterprise network security analyzer☆105Updated last year
- Open source malware detection program using machine learning algorithms on system call traces.☆19Updated 6 years ago
- Curated list of ransomware-related resources; awesome style.☆12Updated last year
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆85Updated last year
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆39Updated 3 years ago
- Dynamic Malware Analsysis Sandbox☆9Updated last year