OWASP / Intelligent-Intrusion-Detection-SystemLinks
☆27Updated 4 years ago
Alternatives and similar repositories for Intelligent-Intrusion-Detection-System
Users that are interested in Intelligent-Intrusion-Detection-System are comparing it to the libraries listed below
Sorting:
- Pentest ToolKit☆28Updated 5 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- intrusion detection☆24Updated 8 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆40Updated 7 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆29Updated 7 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆104Updated 5 years ago
- A SIEM inspired by HECTOR, built on Django.☆29Updated 6 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆140Updated 6 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- Finds internet-exposed resources in an AWS account☆18Updated 9 months ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 12 years ago
- A curated threat modeling library collection☆22Updated last year
- DefectDojo Documentation☆17Updated 3 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆25Updated 4 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆29Updated 5 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 7 years ago
- SSH brute-force script created for HackTheBox☆17Updated 5 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- This repository will host resources for collecting information about cloud providers - SaaS, IaaS, PaaS, DaaS etc.☆29Updated 5 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆20Updated 8 years ago
- Easily Expandable Wireless Intrusion Detection System☆31Updated 4 years ago
- ☆21Updated 2 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆18Updated 4 years ago
- Machine Learning for Cyber Security☆30Updated 3 years ago
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Updated 4 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆25Updated 7 years ago