Vulnerable environments
- URSID makes it possible to deploy multiple variants of vulnerable virtual architectures from a single attack scenario description. These architectures can be used to train security teams or students, or as a honeypot for learning and analyzing attack techniques used in the field. You can check the CTF scenario “Casinolimit” created with URSID (contact: Pierre-Victor Besson)
Malware analysis
- BAGUETTE is a heterogeneous graph data structure used to represent the behavior of malware samples (contact: Vincent Raulin)
- GUI-Mimic is a software that automates the use of graphical software through short recorded sequences (no longer maintained)
Network data generation
- Fos-R creates synthetic pcap files from machine learning models, and can generate realistic background traffic in URSID environments (contact: Pierre-François Gimenez)
- FlowChronicle creates network flows statistically similar to a network capture, with an emphasis on temporal dependencies. It allows in particular dataset augmentation (contact: Pierre-François Gimenez)
- TADAM learns probabilistic timed automata of network protocols from pcap files (contact: Pierre-François Gimenez)