Keyvanhardani / AI-Driven-SIEM-Realtime-Operator-with-Groq-IntegrationView external linksLinks
This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and response. Using Convolutional Neural Networks (CNN), Natural Language Processing (NLP), and the Groq API.
☆18Nov 10, 2024Updated last year
Alternatives and similar repositories for AI-Driven-SIEM-Realtime-Operator-with-Groq-Integration
Users that are interested in AI-Driven-SIEM-Realtime-Operator-with-Groq-Integration are comparing it to the libraries listed below
Sorting:
- ☆10Apr 26, 2025Updated 9 months ago
- Fast API Endpoint!. This project examines, analyses the malware statically & dynamically using conventional strategies and also apply mac…☆10Apr 10, 2023Updated 2 years ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- Data and code: "Answering legal questions from laymen in German civil law system", Büttner & Habernal, EACL'24☆13Mar 2, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Sep 10, 2024Updated last year
- Collection of LeetCode questions to ace the coding interview!☆14Feb 1, 2024Updated 2 years ago
- Codes and Solutions for the book Grokking Algorithm☆15Dec 13, 2025Updated 2 months ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 4 months ago
- ☆13Jul 20, 2024Updated last year
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- a nodejs version of vless☆12Oct 29, 2025Updated 3 months ago
- A bridge to launch managed applications (.NET) into MS signed exe via dll injection☆13Aug 29, 2020Updated 5 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- MarlinRB - 3D Printer Firmware based on Marlin 3D v2.0.9.2, for Flyingbear Reborn with MKS Robin Nano v1.1, MKS Robin Nano v1.3, MKS Robi…☆10Jan 29, 2022Updated 4 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated 3 weeks ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- A basic Intrusion Detection and Prevention System (IDPS) designed to monitor various activities on a host system, detect suspicious beha…☆22Apr 21, 2023Updated 2 years ago
- An open-source python script that can generate books using ChatGPT to be listed on Amazon KDP.☆13Jul 17, 2023Updated 2 years ago
- 💾A moleculer service mixin for minio and S3 💾☆15Sep 16, 2022Updated 3 years ago
- Implementation of Voice over IP in Python☆18Jul 23, 2020Updated 5 years ago
- 🎙️ A vocal assistant that performs other tasks than simply talk, using Text-to-Speech and Speech-To-text.☆15Sep 5, 2022Updated 3 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- ☆16Oct 6, 2023Updated 2 years ago
- ☆14May 14, 2024Updated last year
- A Generic WPA implementation in Go☆10Jun 17, 2019Updated 6 years ago
- USB Joystick adapter for CCTV Camera Pelco-D Pan-Tilt-Zoom Over RS485☆15Feb 27, 2017Updated 8 years ago
- Code for paper https://arxiv.org/abs/2501.00522☆14Apr 28, 2025Updated 9 months ago
- This project provides a WordPress plugin and accompanying Streamlit code that enables user authentication in Streamlit applications using…☆16Sep 15, 2025Updated 4 months ago
- Patching framework for Xtensa based Qualcomm Wifi chips☆13Aug 7, 2023Updated 2 years ago
- Graph retrieval augmented generation with OpenAI, LangChain and Neo4J☆12Aug 5, 2025Updated 6 months ago
- 🔬Writing reliable & fault-tolerant microservices with https://nats.io☆16Mar 27, 2018Updated 7 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- 🌃 Start and control a Tor instance.☆12Apr 9, 2022Updated 3 years ago
- Implemented deterministic FrozenLake ‘grid world’ problem where Q-learning agent learned a defined policy to optimally navigate through t…☆18Jan 16, 2021Updated 5 years ago
- IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications☆18May 10, 2024Updated last year
- A Python implementation of a Voice Over IP☆16Mar 5, 2022Updated 3 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- like hacking, this is a brutefore for DVR - camara HIKVision☆16Sep 2, 2017Updated 8 years ago