This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning models, network monitoring tools, and intrusion detection systems to monitor and respond to security threats in real-time.
☆15Mar 27, 2024Updated 2 years ago
Alternatives and similar repositories for Analysis-TCP-UDP
Users that are interested in Analysis-TCP-UDP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆13Apr 14, 2024Updated 2 years ago
- retrieve comprehensive information about a website, including its title, last modified date, DNS information, subdomains, firewall names,…☆16Mar 24, 2024Updated 2 years ago
- GrpcReplay is an open-source network monitoring tool which can record your grpc traffic and use it for shadowing, load testing, monitorin…☆28Oct 16, 2025Updated 6 months ago
- Analysis of traffic behaviour on networks for different traffic scenarios and network configurations.☆15Apr 24, 2026Updated last week
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is a Telegram bot designed to back up messages and media files from Telegram chats to a local file system and a SQLite database. It …☆16Aug 20, 2024Updated last year
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆28Sep 2, 2024Updated last year
- AI-Powered CyberSecurity Compliance: Boost Network Security with OpenAI GPT-3.5-turbo☆10May 18, 2023Updated 2 years ago
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆21May 4, 2025Updated 11 months ago
- Gradio + Coqui-ai☆17Nov 25, 2023Updated 2 years ago
- This is a software application to detect network intrusion by monitoring a network or system for malicious activity and predicts whether …☆13May 18, 2023Updated 2 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- ☆22May 21, 2024Updated last year
- 150 Fast prompts OpenAi☆23Dec 28, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆15Jun 24, 2025Updated 10 months ago
- This script monitors the remaining traffic of VMs on Vultr, DigitalOcean, and Linode. If the remaining traffic is zero, it shuts down the…☆33Jul 12, 2024Updated last year
- Fluere is a powerful and versatile tool designed for network monitoring and analysis. It is capable of capturing network packets in pcap …☆60Mar 11, 2026Updated last month
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- ☆11Feb 19, 2024Updated 2 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Netwo…☆20Feb 26, 2024Updated 2 years ago
- A research & development project to create and deploy a Network-based Intrusion Detection System (IDS) to detect intruders on a distribut…☆12Jan 9, 2019Updated 7 years ago
- ☆14Jul 22, 2024Updated last year
- Cervical cancer is the second most common type of cancer that is found in the women worldwide. Generally, cancer caused due to irregular …☆10Mar 24, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- denosing for dirty document image☆13May 20, 2019Updated 6 years ago
- This is a Telegram bot that can download audio from YouTube videos and summarize the content using OpenAI's GPT-3 engine. It's a handy to…☆21Apr 14, 2024Updated 2 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 7 years ago
- ☆16Jul 15, 2022Updated 3 years ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- Reproduction of "Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks"☆13May 30, 2021Updated 4 years ago
- We want to create a Repo which can provide different Malwares wrote by Python.☆27May 26, 2025Updated 11 months ago
- A Practical Deep Learning-based Android Malware Detection System☆15Nov 4, 2022Updated 3 years ago
- ☆22Aug 1, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆53Jul 18, 2024Updated last year
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- 等级保护安全加固方案☆30Apr 18, 2019Updated 7 years ago
- Simple agent framework using Ollama tool calling☆10Aug 27, 2024Updated last year
- ☆21Aug 25, 2024Updated last year
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Denoising Diffusion Probabilistic Models (DDPM)☆20Oct 11, 2022Updated 3 years ago