System for network traffic analysis and anomaly detection.
☆93Jul 11, 2025Updated 8 months ago
Alternatives and similar repositories for Nemea
Users that are interested in Nemea are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection modules of the Nemea system.☆22Mar 26, 2025Updated last year
- Base modules of the Nemea system. This repository contains modules for export, replay, filtering, merging etc.☆17Sep 30, 2025Updated 6 months ago
- Bibliography of stuff I've been reading☆13Nov 1, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Updated this week
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploring the network released by the ICIJ from the Panama Papers☆21Jan 22, 2018Updated 8 years ago
- Enrich IP addresses with metadata and threat intelligence indicators.☆24Aug 12, 2023Updated 2 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- IPFIXcol is an implementation of an IPFIX (RFC 7011) collector☆66Mar 9, 2020Updated 6 years ago
- Notes about books I've read☆31Jan 23, 2024Updated 2 years ago
- ☆12Feb 1, 2020Updated 6 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆28Sep 2, 2024Updated last year
- ExaFS is a tool for creation, validation, and execution of ExaBGP messages.☆13Feb 19, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- ☆68Sep 5, 2024Updated last year
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- DevSecOps command line asset inventory tool☆30Oct 2, 2023Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Like macOS `open` but for Windows☆13Jul 17, 2021Updated 4 years ago
- Machine Learning for Computer Security☆280Jan 6, 2022Updated 4 years ago
- Messiness reading list☆56Dec 24, 2021Updated 4 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- CYBAR OSINT CTF 2020☆23Jun 10, 2020Updated 5 years ago
- Workshops created by the Quartz AI Studio☆48Nov 13, 2020Updated 5 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆32Nov 10, 2025Updated 5 months ago
- C++ implementation of ssdeep-compatible fast fuzzy hashing☆38Jun 28, 2017Updated 8 years ago
- IPFIX flow exporter with DPDK support capable of bi-directional flows, per-packet-information statistics, and extensibility via processin…☆79Mar 17, 2026Updated 3 weeks ago
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- Collaborative malware analysis framework☆382Jan 22, 2019Updated 7 years ago
- Example code for neural-network-based anomaly detection of time-series data (uses LSTM)☆180Jun 9, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Netflow is a key component for network traffic monitoring. As high speed technologies such as 10 Gbps or 40 Gbps links are common in a ba…☆22Apr 15, 2015Updated 10 years ago
- Jolly good library for SPIF/Label/Clearance handling☆11Jan 2, 2024Updated 2 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated last year
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago