This repository contains an AI-driven User Behavior Analytics (UBA) system designed to detect insider threats by analyzing user activity patterns. The software leverages machine learning algorithms to monitor, identify, and flag anomalous behavior that may indicate potential security risks within an organization.
☆26Mar 2, 2025Updated last year
Alternatives and similar repositories for User-Behavior-Analytics-UBA-for-Insider-Threat-Detection
Users that are interested in User-Behavior-Analytics-UBA-for-Insider-Threat-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 9 months ago
- Helm charts for deploying Malcolm☆16Updated this week
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆14Oct 4, 2025Updated 5 months ago
- ☆24Jan 19, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OWASP Foundation Web Respository☆20Dec 22, 2025Updated 3 months ago
- hunt framework project template.☆21Nov 17, 2021Updated 4 years ago
- An awesome list of honeypot resources. With repository stars⭐ and forks🍴☆25Updated this week
- A list of CTF resources for participants in the WiCyS Security Training Scholarship in partnership with the SANS Institute.☆25Sep 20, 2023Updated 2 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Wazuh - Chef cookbooks☆24Jul 26, 2023Updated 2 years ago
- Some basics on how to get started with Ghdira Scripting☆26Nov 11, 2025Updated 4 months ago
- OWASP Foundation Web Respository☆27Jan 27, 2026Updated 2 months ago
- IDA loader to help with SEPROM reverse engineering.☆36Aug 26, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Smart Setup Server For BugBounty☆26Aug 21, 2023Updated 2 years ago
- Cowrie Honeypot with Elasticsearch☆39Oct 11, 2021Updated 4 years ago
- ☆31Feb 10, 2023Updated 3 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 4 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- AI-Assisted Reverse Engineering with Ghidra☆92Mar 20, 2026Updated last week
- Ludus range for the Constructing Defense Lab☆113Feb 23, 2026Updated last month
- Black Hat Python: Python for Pentesters, by EC-Council☆34Jun 20, 2024Updated last year
- CTF Cheatsheet☆35Jun 1, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 🥷 [CheatSheet] Useful wiki for Capture The Flag (CTF)☆36Jan 30, 2024Updated 2 years ago
- Wazuh integration TheHive☆41Feb 21, 2023Updated 3 years ago
- kali linux mcp,pentest,penetration test☆53Sep 14, 2025Updated 6 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Wazuh - Splunk App☆56Sep 17, 2024Updated last year
- ☆63Mar 21, 2025Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆68Jan 11, 2026Updated 2 months ago
- Yet another DuckDuckGo AI reverse engineering API running on Cloudflare Worker☆60Feb 19, 2025Updated last year
- Hands-on SageMaker lab looking at cell phone churn☆42Mar 5, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69May 11, 2024Updated last year
- Volatility3 Linux profiles☆77Dec 8, 2025Updated 3 months ago
- HackerGPT Cyber-Security Companion☆84Aug 17, 2025Updated 7 months ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Nov 2, 2021Updated 4 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Aug 9, 2019Updated 6 years ago
- A collection of my quick and dirty scripts for vulnerability POC and detections☆75Dec 4, 2025Updated 3 months ago
- Hack+☆51Feb 27, 2023Updated 3 years ago