TPs-ESIR-S9 / PcapFileAnalysisLinks
Malicious Network Traffic Analysis with AI
☆21Updated last year
Alternatives and similar repositories for PcapFileAnalysis
Users that are interested in PcapFileAnalysis are comparing it to the libraries listed below
Sorting:
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆55Updated 4 months ago
- Malicious PowerShell Dataset☆22Updated 2 years ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆68Updated last month
- malicious PowerShell script detection model☆41Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆175Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆109Updated last year
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆128Updated 9 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last week
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆48Updated 3 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆51Updated 2 months ago
- A logic-based enterprise network security analyzer☆136Updated 2 years ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆36Updated last year
- ☆82Updated 10 months ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆38Updated 5 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Updated 8 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆139Updated 2 weeks ago
- Public datasets to help you address various cyber security problems.☆461Updated 3 years ago
- A free online class on network information hiding/steganography/covert channels.☆108Updated 3 weeks ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆254Updated 4 years ago
- Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC)…☆16Updated 9 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Updated last year
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆161Updated 4 months ago
- ATT&CK Evaluations Library☆90Updated last month
- An environment for testing AI pentesting agents against a simulated network.☆197Updated last year
- ☆37Updated 7 months ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- ☆128Updated 5 years ago
- ☆25Updated 4 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year