dataSet for kubAnomaly model
☆19Mar 24, 2023Updated 3 years ago
Alternatives and similar repositories for KubAnomaly_DataSet
Users that are interested in KubAnomaly_DataSet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆25May 15, 2023Updated 2 years ago
- Snort rules☆11Oct 22, 2015Updated 10 years ago
- ☆10Sep 25, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆18Feb 2, 2023Updated 3 years ago
- SysFlow documentation and issues tracker☆46Sep 30, 2024Updated last year
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- 基于污点分析的JSP Webshell检测工具,模拟JVM的栈帧操作进行数据流分析,可以检测出各种变形的JSP Webshell☆21Dec 6, 2021Updated 4 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 5 years ago
- ☆15Jan 30, 2025Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆17Mar 22, 2019Updated 7 years ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- Daehee Yun Tech blog☆23Nov 24, 2024Updated last year
- ☆17Jan 18, 2021Updated 5 years ago
- 狂神说MD笔记☆13Mar 7, 2021Updated 5 years ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Jul 24, 2021Updated 4 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆19May 6, 2024Updated last year
- docker学习,参考b战 遇见狂神说☆14Apr 1, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Code and data for the USENIX 2025 paper "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating…☆24Aug 12, 2025Updated 7 months ago
- Single Master - Multi Worker K8S cluster for learning and development☆15Jul 6, 2020Updated 5 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- 针对Java Web的RASP(Runtime application self-protection )漏洞防护系统。☆41Sep 10, 2025Updated 6 months ago
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆17Apr 26, 2021Updated 4 years ago
- 云原生安全☆38Feb 20, 2022Updated 4 years ago
- Vulnerable application for security issues demo☆17Jan 18, 2019Updated 7 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated 2 years ago
- Compartmentalised monolithic library OS☆21Jul 15, 2021Updated 4 years ago
- The python client of 360 Netlab whois database☆14Dec 5, 2018Updated 7 years ago
- ☆23Mar 25, 2019Updated 7 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- trivy-plugin-report 是一个可以将 trivy 的扫描结果转化为 Excel 和 Markdown 格式报告的插件☆19Mar 12, 2025Updated last year
- Speaker-listener Label Propagation Algorithm Implemented in Python☆15Oct 31, 2013Updated 12 years ago