HolmesProcessing / Holmes-StorageLinks
The Storage Planner manages access to all data within the Holmes Processing system. It orchestrates the interaction across multiple Databases, serves the files for analysis, etc.
☆16Updated 6 years ago
Alternatives and similar repositories for Holmes-Storage
Users that are interested in Holmes-Storage are comparing it to the libraries listed below
Sorting:
- Main program for receiving tasking and objects. It validates input, checks authentication, and pushes the requests to the pipeline.☆14Updated 7 years ago
- Investigation Planner for fast running analysis with predictable execution time. For example, static analysis.☆29Updated 6 years ago
- Investigation Planner for long running analysis with unpredictable execution time. For example, dynamic analysis.☆16Updated 8 years ago
- Passivedns monitor implementation in Rust.☆12Updated 9 years ago
- website☆9Updated 4 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- (OBSOLETE) Plugins for Bro☆53Updated 7 years ago
- Domain name classifier looking for good vs. possibly malicious providers☆33Updated 7 years ago
- ☆12Updated 8 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆146Updated 3 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- go package for indexing and querying certain aspects of bgp dumps and some other things.☆14Updated 8 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- Realtime and Online Model Development Framework☆27Updated 8 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Updated 9 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Updated 8 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 10 years ago
- Java implementation of Lempel-Ziv Jaccard Distance☆21Updated 7 years ago
- Time-Machine Dynamic Bulk Packet Recorder☆36Updated 2 months ago
- ☆11Updated 7 years ago
- The Data Analysis Pipeline☆17Updated 6 years ago
- threat language parser☆60Updated 10 years ago
- Kaggle "Microsoft Malware Classification Challenge". 6th place solution☆27Updated 10 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 11 years ago
- DGA Domains detection☆66Updated 7 years ago
- Bro Snippets☆21Updated 10 years ago