linux kernel event log collector by ebpf
☆35Mar 6, 2024Updated 2 years ago
Alternatives and similar repositories for KellectAgent-Linux
Users that are interested in KellectAgent-Linux are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- windows kernel event log collect☆122Jan 9, 2026Updated 3 months ago
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆15Aug 16, 2023Updated 2 years ago
- zjut master thesis☆11Mar 15, 2024Updated 2 years ago
- trivy-plugin-report 是一个可以将 trivy 的扫描结果转化为 Excel 和 Markdown 格式报告的插件☆19Mar 12, 2025Updated last year
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆21Oct 31, 2020Updated 5 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 8 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆26May 15, 2023Updated 2 years ago
- ☆11Feb 22, 2016Updated 10 years ago
- ☆25Dec 14, 2023Updated 2 years ago
- 基于源代码的图融合的智能合约漏洞检测☆24Apr 23, 2024Updated 2 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆195Updated this week
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- ☆28Dec 10, 2021Updated 4 years ago
- CNNVD 漏洞收集☆20Jul 18, 2023Updated 2 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- The omegaUp sandbox☆14Feb 13, 2023Updated 3 years ago
- 基于IPv6的智能机器人园区异常情况监测系统,包括无线传感器网络、智能巡检机器人、监控数据服务器、主服务器端和监测客户端APP五个子系统。其中,无线传感器网络是以树莓派为核心的基于ZigBee的传感器平台,及海康威视网络摄像头。智能巡检机器人是以Jetson TX2为核心的…☆24Oct 29, 2020Updated 5 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆15Apr 22, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 基于红楼梦知识内容的简易问答系统☆17Jul 10, 2022Updated 3 years ago
- Conflict-aware Inference of Python Compatible Runtime Environments with Domain Knowledge Graph, ICSE 2022☆14Dec 12, 2021Updated 4 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- Demonstrating how you can take an action to your intrusions detected by Falco using OpenFaaS functions☆26Mar 24, 2021Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- ☆15Jan 30, 2025Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- 2015.11.12 三个白帽一题的源码☆18Nov 12, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Realize the recognition of 0-9 gestures based on tensorflow2.0+opencv+CNN☆16May 16, 2020Updated 5 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- 博客: chenxiaosong.com☆19Updated this week