Egida-Kassandra / kassandraView external linksLinks
Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.
☆25Feb 15, 2023Updated 3 years ago
Alternatives and similar repositories for kassandra
Users that are interested in kassandra are comparing it to the libraries listed below
Sorting:
- ☆13Feb 25, 2021Updated 4 years ago
- Convert Splunk SPL to Elasticsearch DSL with pegjs☆13Apr 25, 2022Updated 3 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Anomaly detection and monitoring software☆19Sep 7, 2018Updated 7 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Feb 28, 2023Updated 2 years ago
- agent 部分使用go 开发而成,采用插件模式开发而成,配置部分以及agent存活使用etcd。☆20Aug 2, 2021Updated 4 years ago
- [ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion☆18Nov 20, 2023Updated 2 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Elasticsearch querying library☆20Jun 16, 2019Updated 6 years ago
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 4 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆40Nov 16, 2025Updated 3 months ago
- 记录我的安全学术学习☆129Dec 15, 2020Updated 5 years ago
- GO开发而成,用于NIDS HIDS 分析的规则引擎,使用WorkerPool 高性能检测,支持多字段 "和" "或" 检测, 支持频率检测☆78Feb 8, 2025Updated last year
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆40Apr 25, 2024Updated last year
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Jul 10, 2017Updated 8 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Dynatrace FM-Index library☆15Nov 11, 2025Updated 3 months ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆14Feb 19, 2021Updated 4 years ago
- Pockr Asset Management 破壳资产管理工具☆11Dec 8, 2022Updated 3 years ago
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- 在原版nps的基础上,增加了nps探测,以及对应的利用方式(如获取cookie,页面等),进行一些简单的二开。未经过大量测试,可能存在bug。☆21Aug 5, 2025Updated 6 months ago
- An Obsidian plugin to create meeting notes from Microsoft Outlook .msg files☆13Apr 2, 2025Updated 10 months ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- Tutoriales sobre el uso de la API de twitter en PHP☆14Aug 19, 2014Updated 11 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Generate images of Chinese license plates☆11Feb 8, 2021Updated 5 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated last year
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- ☆11Dec 17, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Updated this week
- Record my learning progress.☆10Mar 1, 2022Updated 3 years ago
- ☆10Jan 21, 2022Updated 4 years ago