Python EDR system Example (server and client-side)
☆20Jan 13, 2021Updated 5 years ago
Alternatives and similar repositories for Endpoint-Detection-and-Response
Users that are interested in Endpoint-Detection-and-Response are comparing it to the libraries listed below
Sorting:
- Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-Cradle…☆316Oct 21, 2021Updated 4 years ago
- Official Pytorch Implementation for Continual Learning For On-Device Environmental Sound Classification☆14Jul 19, 2022Updated 3 years ago
- ☆10May 15, 2021Updated 4 years ago
- PyTorch implementation of "Nextformer: A ConvNeXt Augmented Conformer For End-To-End Speech Recognition"☆10Dec 15, 2022Updated 3 years ago
- J-Net is aimed for audio separation with randomly weighted encoder.☆12Oct 23, 2019Updated 6 years ago
- Simple sinc interpolation in PyTorch.☆15Jul 8, 2023Updated 2 years ago
- ☆12May 6, 2020Updated 5 years ago
- Rainbow Keywords - Official PyTorch Implementation☆13Jun 27, 2024Updated last year
- A deep neural network for finding text-independent speaker embedding written in tensorflow and tensorpack☆10Feb 19, 2018Updated 8 years ago
- Four neural network architectures to classify sound source direction☆11Oct 3, 2020Updated 5 years ago
- This is a template for the Non-autoregressive Deep Learning-Based TTS model (in PyTorch).☆14Jun 15, 2021Updated 4 years ago
- Exploratory notebook . Techniques used: FFT, ARIMA, GARCH, Monte Carlo Simulations, fbprophet, LSTM, WaveNet.☆11Jul 11, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Efficient Personalized Speech Enhancement through Self-Supervised Learning☆23Mar 12, 2023Updated 3 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- ☆14Apr 4, 2024Updated last year
- Text to Speech with PyTorch (English and Mongolian)☆13May 3, 2020Updated 5 years ago
- a optional way to extract audio feature☆13Jun 10, 2017Updated 8 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- ☆13Nov 14, 2023Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 6 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Responsive registration form with HTML and CSS☆11Oct 9, 2022Updated 3 years ago
- ☆16May 8, 2022Updated 3 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- The implementation of LSTM with projection layer by PyTorch☆17Sep 1, 2019Updated 6 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- INTEL PIN dbi based process tracer☆19Jun 25, 2020Updated 5 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- Code for ICASSP 2019 paper☆18Oct 29, 2018Updated 7 years ago
- ☆12Nov 6, 2017Updated 8 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 5 years ago