OWASP / Intelligent-Intrusion-Detection-System
☆26Updated 3 years ago
Alternatives and similar repositories for Intelligent-Intrusion-Detection-System:
Users that are interested in Intelligent-Intrusion-Detection-System are comparing it to the libraries listed below
- Pentest ToolKit☆27Updated 4 years ago
- intrusion detection☆23Updated 7 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆22Updated 4 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 4 years ago
- Awesome Cyber-Security Data-sets Collection☆19Updated 6 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆46Updated last year
- Malicious traffic detection system☆11Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 9 months ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 7 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆20Updated 6 years ago
- Detect leaks in security event logs.☆20Updated 5 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆19Updated 7 years ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated last year
- Maltego integration of https://clearbit.com☆37Updated 4 years ago
- Collection of cyber security and "AI" relevant topics☆74Updated 7 years ago
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- Machine Learning for Phishing Website Detection☆55Updated 4 years ago
- Custom Maltego transforms☆64Updated 9 years ago
- Experiments to detect phishing websites using neural networks☆19Updated 5 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆17Updated 4 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- This repository will host resources for collecting information about cloud providers - SaaS, IaaS, PaaS, DaaS etc.☆27Updated 4 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 4 months ago
- Machine Learning for Cyber Security☆28Updated 3 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆20Updated 4 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆38Updated 7 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆29Updated 9 years ago