Software

Vulnerable environments

  • URSID makes it possible to deploy multiple variants of vulnerable virtual architectures from a single attack scenario description. These architectures can be used to train security teams or students, or as a honeypot for learning and analyzing attack techniques used in the field. You can check the CTF scenario “Casinolimit” created with URSID (contact: Pierre-Victor Besson)

Malware analysis

  • BAGUETTE is a heterogeneous graph data structure used to represent the behavior of malware samples (contact: Vincent Raulin)
  • GUI-Mimic is a software that automates the use of graphical software through short recorded sequences (no longer maintained)

Network data generation

  • Fos-R creates synthetic pcap files from machine learning models, and can generate realistic background traffic in URSID environments (contact: Pierre-François Gimenez)
  • FlowChronicle creates network flows statistically similar to a network capture, with an emphasis on temporal dependencies. It allows in particular dataset augmentation (contact: Pierre-François Gimenez)
  • TADAM learns probabilistic timed automata of network protocols from pcap files (contact: Pierre-François Gimenez)