Egida-Kassandra / kassandra
Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.
☆21Updated last year
Related projects ⓘ
Alternatives and complementary repositories for kassandra
- This repository contains a curated list of awesome resources related to AISecOps.☆12Updated 2 years ago
- ☆30Updated 4 months ago
- ☆19Updated 3 years ago
- ☆41Updated last year
- 当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~☆15Updated 6 months ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Updated 5 years ago
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆56Updated 6 months ago
- ☆81Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- The following is a simple example of how LLMs and langchain agents can simplify asking questions to understand the security posture of a …☆20Updated last year
- User and Entity Behavior Analytics by deep learning☆100Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆11Updated 3 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 7 months ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆71Updated last year
- 欺骗防御Linux版本Agent☆13Updated 3 years ago
- A Knowledge Graph for Open Source Security Tools☆15Updated last year
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆20Updated last year
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆27Updated last month
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- 企业级安全智能化实践☆69Updated 2 years ago
- ☆30Updated last year
- Import Mitre Att&ck into Neo4j database☆33Updated last year
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆13Updated 2 years ago
- Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.☆34Updated 2 months ago
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆16Updated 4 months ago
- 这是一个网络安全知识图谱开源平台,为网络安全的智能化、体系化开阔新方向,对行业发展贡献绵薄之力。☆42Updated last year
- ATT&CK技战术数据☆15Updated 3 years ago
- ☆15Updated last year