TPs-ESIR-S9 / PcapFileAnalysisLinks
Malicious Network Traffic Analysis with AI
☆19Updated last year
Alternatives and similar repositories for PcapFileAnalysis
Users that are interested in PcapFileAnalysis are comparing it to the libraries listed below
Sorting:
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆54Updated 3 months ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆68Updated 3 weeks ago
- Malicious PowerShell Dataset☆21Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆51Updated last month
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆253Updated 4 years ago
- Public datasets to help you address various cyber security problems.☆460Updated 3 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated 3 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆48Updated 2 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆59Updated last year
- We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environme…☆49Updated 6 months ago
- malicious PowerShell script detection model☆42Updated 4 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆35Updated 4 months ago
- Transformer Neural Network from Dynamic Malware Detection☆38Updated 3 weeks ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆139Updated this week
- ☆38Updated last year
- Dataset with labeled benign and malicious files 🗃️☆147Updated 2 years ago
- ATT&CK Evaluations Library☆89Updated last week
- ☆11Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆109Updated last year
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- ☆37Updated 6 months ago
- Collection of Linux and macOS Volatility3 Intermediate Symbol Files (ISF), suitable for memory analysis 🔍☆244Updated 2 weeks ago
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆111Updated last year
- Machine Learning in Cybersecurity☆88Updated 6 months ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆25Updated 8 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆203Updated 2 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Updated 2 years ago
- ☆127Updated 5 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆160Updated 3 months ago