TPs-ESIR-S9 / PcapFileAnalysisLinks
Malicious Network Traffic Analysis with AI
☆22Updated 2 years ago
Alternatives and similar repositories for PcapFileAnalysis
Users that are interested in PcapFileAnalysis are comparing it to the libraries listed below
Sorting:
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆60Updated 5 months ago
- Malicious PowerShell Dataset☆22Updated 2 years ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆69Updated 2 months ago
- A logic-based enterprise network security analyzer☆137Updated 3 years ago
- We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environme…☆49Updated 2 weeks ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆138Updated 10 months ago
- ☆117Updated 4 months ago
- CTF challenges designed and implemented in machine learning applications☆199Updated 4 months ago
- Materials from the CS Level-Up trainers☆11Updated 5 months ago
- ☆10Updated 5 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆49Updated 2 weeks ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- PenGym: Pentesting Training Framework for Reinforcement Learning Agents☆54Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆140Updated last week
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆314Updated last year
- malicious PowerShell script detection model☆41Updated 4 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆163Updated 5 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆159Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆41Updated 2 weeks ago
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Updated 3 months ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆122Updated 3 months ago
- An Intrusion Prevention System for Attack-Defense CTFs☆52Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆179Updated 2 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Updated 2 years ago
- ☆34Updated 5 years ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆36Updated last year
- Dataset with labeled benign and malicious files 🗃️☆149Updated 2 years ago