A framework for the Analysis of Intrusion Detection Alerts
☆17Nov 11, 2021Updated 4 years ago
Alternatives and similar repositories for AIDA-Framework
Users that are interested in AIDA-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆31Jul 9, 2025Updated 10 months ago
- ☆20Mar 31, 2019Updated 7 years ago
- Semantic Proximity Search on Heterogeneous Graph by Proximity Embedding☆15Feb 20, 2018Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆44Dec 16, 2022Updated 3 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 7 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆20Mar 27, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Graph-Based Procedural Modelling Library☆22Jan 3, 2026Updated 4 months ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- some tools plugins☆14May 24, 2023Updated 2 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- Code for the paper "Refining Language Model with Compositional Explanation" (NeurIPS 2021)☆11Oct 25, 2021Updated 4 years ago
- Implementation of the DeepLog anomaly detection system☆19Jul 28, 2018Updated 7 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Nov 14, 2019Updated 6 years ago
- Feed Generator for MISP☆19Nov 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Crack any ftp server by using FTP Crack Elite tool kit, ftp bruteforce☆12Nov 7, 2017Updated 8 years ago
- In this small project we will predict the email that in which folder it will go in spam or primary.☆11Jul 5, 2016Updated 9 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆13Jul 26, 2023Updated 2 years ago
- 我的远程连接一键部署工具。☆10May 4, 2023Updated 3 years ago
- ☆23Oct 22, 2024Updated last year
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- An adaptive URL online checker for python2 and python3☆10Aug 10, 2018Updated 7 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Repository of creating different example suricata data sets☆36Jan 2, 2019Updated 7 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆25Aug 13, 2024Updated last year
- ☆39Aug 8, 2024Updated last year
- A fast implementation of Leiserchess AI for MIT 6.172`16 http://scrimmage.csail.mit.edu/☆12Dec 22, 2016Updated 9 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆178Sep 3, 2022Updated 3 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Apr 10, 2017Updated 9 years ago
- 系统巡检脚本☆11Aug 9, 2016Updated 9 years ago