This repository contains an AI-driven User Behavior Analytics (UBA) system designed to detect insider threats by analyzing user activity patterns. The software leverages machine learning algorithms to monitor, identify, and flag anomalous behavior that may indicate potential security risks within an organization.
☆24Mar 2, 2025Updated last year
Alternatives and similar repositories for User-Behavior-Analytics-UBA-for-Insider-Threat-Detection
Users that are interested in User-Behavior-Analytics-UBA-for-Insider-Threat-Detection are comparing it to the libraries listed below
Sorting:
- Ungraded practice exercises for python scripting for security course.☆12Jun 22, 2025Updated 8 months ago
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- Helm charts for deploying Malcolm☆16Updated this week
- OWASP Foundation Web Respository☆14Oct 4, 2025Updated 5 months ago
- e2e Scanning research module☆22Jun 30, 2025Updated 8 months ago
- Collection of scripts intended to aid in reverse engineering/hacking of HP OfficeJet printers.☆13Jan 20, 2023Updated 3 years ago
- A systematic, AI-powered penetration testing reasoning engine (MCP server) for attack path planning, CTF/HTB solving, and automated pente…☆28Aug 30, 2025Updated 6 months ago
- A list of CTF resources for participants in the WiCyS Security Training Scholarship in partnership with the SANS Institute.☆25Sep 20, 2023Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆20Dec 22, 2025Updated 2 months ago
- Wazuh - Chef cookbooks☆24Jul 26, 2023Updated 2 years ago
- Simple Telegram webscrap bot☆16Oct 20, 2022Updated 3 years ago
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- An awesome list of honeypot resources. With repository stars⭐ and forks🍴☆25Updated this week
- Smart Setup Server For BugBounty☆26Aug 21, 2023Updated 2 years ago
- Cheatsheet from the PJPT course of TCM security.☆33Jan 15, 2024Updated 2 years ago
- OWASP Foundation Web Respository☆26Jan 27, 2026Updated last month
- AI-Assisted Reverse Engineering with Ghidra☆72Jan 21, 2026Updated last month
- IDA loader to help with SEPROM reverse engineering.☆36Aug 26, 2025Updated 6 months ago
- Cowrie Honeypot with Elasticsearch☆39Oct 11, 2021Updated 4 years ago
- ☆31Feb 10, 2023Updated 3 years ago
- CTF Cheatsheet☆35Jun 1, 2020Updated 5 years ago
- Black Hat Python: Python for Pentesters, by EC-Council☆34Jun 20, 2024Updated last year
- Ludus range for the Constructing Defense Lab☆106Feb 23, 2026Updated 2 weeks ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51May 8, 2024Updated last year
- kali linux mcp,pentest,penetration test☆53Sep 14, 2025Updated 5 months ago
- ☆62Mar 21, 2025Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Hands-on SageMaker lab looking at cell phone churn☆42Mar 5, 2021Updated 5 years ago
- HackerGPT Cyber-Security Companion☆81Aug 17, 2025Updated 6 months ago
- Wazuh - Splunk App☆56Sep 17, 2024Updated last year
- Yet another DuckDuckGo AI reverse engineering API running on Cloudflare Worker☆60Feb 19, 2025Updated last year
- Volatility3 Linux profiles☆76Dec 8, 2025Updated 3 months ago
- Wazuh - Quality Assurance☆68Oct 31, 2025Updated 4 months ago
- Simple kanban-style task organiser☆66Feb 24, 2026Updated last week
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Nov 2, 2021Updated 4 years ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆67Jan 11, 2026Updated last month
- This repository contains the full dataset of AWS IAM data (services, actions, resource types and conditions keys). It's updated on a dail…☆68Updated this week
- Python script to check HTTP security headers☆68Nov 16, 2025Updated 3 months ago