Egida-Kassandra / kassandraLinks
Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.
☆24Updated 2 years ago
Alternatives and similar repositories for kassandra
Users that are interested in kassandra are comparing it to the libraries listed below
Sorting:
- ☆85Updated 5 years ago
- User and Entity Behavior Analytics by deep learning☆119Updated 4 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆75Updated 2 years ago
- ☆45Updated 3 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆38Updated 5 months ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Updated 6 years ago
- ☆30Updated 2 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- This repository contains a curated list of awesome resources related to AISecOps.☆18Updated 4 years ago
- ☆38Updated last year
- A logic-based enterprise network security analyzer☆136Updated 2 years ago
- ☆112Updated last year
- 这是一个网络安全知识图谱开源平台,为网络安全的智能化、体系化开阔新方向,对行业发展贡献绵薄之力。☆47Updated 2 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 6 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆25Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- 威胁检测规则集☆15Updated 6 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- 该资源为作者AI安全相关论文的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆33Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆175Updated 2 years ago
- ☆32Updated last year
- Automatically collects the known CVE and its corresponding Poc, and sends it to the LLM for analysis, disassembles the attack steps, gene…☆20Updated last year
- Repository of creating different example suricata data sets☆36Updated 7 years ago
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆140Updated this week
- tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆36Updated 5 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- 《横向移动攻击与检测技术》专栏文章☆17Updated 6 years ago