This repository contains an AI-driven User Behavior Analytics (UBA) system designed to detect insider threats by analyzing user activity patterns. The software leverages machine learning algorithms to monitor, identify, and flag anomalous behavior that may indicate potential security risks within an organization.
☆26Mar 2, 2025Updated last year
Alternatives and similar repositories for User-Behavior-Analytics-UBA-for-Insider-Threat-Detection
Users that are interested in User-Behavior-Analytics-UBA-for-Insider-Threat-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A comprehensive guide on SSH penetration testing techniques and methodologies. Authored by Abhinav Sharma, founder and CEO of Global Offe…☆12Jul 1, 2023Updated 2 years ago
- Helm charts for deploying Malcolm☆16Updated this week
- A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts☆13Apr 14, 2024Updated 2 years ago
- Wireshark dissector for Socket.IO traffic☆15Jul 26, 2016Updated 9 years ago
- OWASP Foundation Web Respository☆15Oct 4, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆24Jan 19, 2020Updated 6 years ago
- OWASP Foundation Web Respository☆21Dec 22, 2025Updated 3 months ago
- hunt framework project template.☆21Nov 17, 2021Updated 4 years ago
- An awesome list of honeypot resources. With repository stars⭐ and forks🍴☆25Updated this week
- A list of CTF resources for participants in the WiCyS Security Training Scholarship in partnership with the SANS Institute.☆25Sep 20, 2023Updated 2 years ago
- urlyzer is a URL parsing analysis tool.☆24Jul 27, 2024Updated last year
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Some basics on how to get started with Ghdira Scripting☆26Nov 11, 2025Updated 5 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆30Dec 1, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆50Nov 5, 2025Updated 5 months ago
- Cheatsheet from the PJPT course of TCM security.☆34Jan 15, 2024Updated 2 years ago
- Black Hat Python: Python for Pentesters, by EC-Council☆34Jun 20, 2024Updated last year
- AI-Assisted Reverse Engineering with Ghidra☆108Mar 20, 2026Updated 3 weeks ago
- Wazuh integration TheHive☆42Feb 21, 2023Updated 3 years ago
- kali linux mcp,pentest,penetration test☆53Sep 14, 2025Updated 7 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- This repository contains the full dataset of AWS IAM data (services, actions, resource types and conditions keys). It's updated on a dail…☆68Updated this week
- Wazuh - Splunk App☆57Sep 17, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hands-on SageMaker lab looking at cell phone churn☆42Mar 5, 2021Updated 5 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69May 11, 2024Updated last year
- Volatility3 Linux profiles☆78Apr 4, 2026Updated 2 weeks ago
- HackerGPT Cyber-Security Companion☆85Aug 17, 2025Updated 8 months ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Nov 2, 2021Updated 4 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Aug 9, 2019Updated 6 years ago
- A collection of my quick and dirty scripts for vulnerability POC and detections☆75Dec 4, 2025Updated 4 months ago
- Python script to check HTTP security headers☆67Nov 16, 2025Updated 5 months ago
- Useful scripts for those administering Wazuh☆95Jan 6, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- Wazuh - RESTful API☆81Sep 17, 2024Updated last year
- pfSense tutorials☆83May 27, 2018Updated 7 years ago
- Various IDA scripts I've created for Reverse engineering.☆96Oct 29, 2024Updated last year
- The infamous 'hack' tool to validate stolen email/pass combinations.☆90Nov 5, 2024Updated last year
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- The IoT Telemetry Simulator allows you to test Azure IoT Hub or Eventhub ingestion at scale. The implementation is communicating with Azu…☆73Aug 13, 2023Updated 2 years ago