windows kernel event log collect
☆121Jan 9, 2026Updated last month
Alternatives and similar repositories for KellectAgent-Windows
Users that are interested in KellectAgent-Windows are comparing it to the libraries listed below
Sorting:
- linux kernel event log collector by ebpf☆34Mar 6, 2024Updated last year
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆91May 15, 2024Updated last year
- 来源于网上,高仿qq管家☆12Jul 2, 2014Updated 11 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆14Mar 1, 2024Updated 2 years ago
- Some personal work on DARPA TC engagement5☆20Aug 7, 2023Updated 2 years ago
- ☆14Mar 2, 2021Updated 4 years ago
- ☆14Mar 31, 2019Updated 6 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- ☆22Apr 23, 2024Updated last year
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Sep 4, 2018Updated 7 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆91Mar 31, 2024Updated last year
- ☆12Sep 13, 2023Updated 2 years ago
- ☆16Jun 12, 2013Updated 12 years ago
- CTI database generator and public dataset☆21Jan 12, 2020Updated 6 years ago
- Wrapper is a contract where you can wrap or transform an existing ERC-721 token into a new wrapped token with ERC-4610 standard.☆378Jan 12, 2022Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- ☆21Sep 5, 2022Updated 3 years ago
- A powerful and easy-to-use mybatis physical paginator 一款功能强大&全自动化的mybatis物理分页器☆32Oct 28, 2020Updated 5 years ago
- A campus secondhand trading system based on the vue.js + stylus + koa2 + sequelize ORM + mysql, and typescript is still learning to migra…☆16Nov 24, 2021Updated 4 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Aug 13, 2021Updated 4 years ago
- bilibil视频鸡语言.exe视频的源代码上传github喽,大家快来下载☆15Jan 25, 2024Updated 2 years ago
- Official implementation of Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4☆29Jan 22, 2024Updated 2 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆24May 15, 2023Updated 2 years ago
- RemoveApiSets is a program that can replace the ApiSets Dlls that already depend on ApiSets Dlls with MSVCR14X Dlls☆33Oct 6, 2024Updated last year
- An NER tool for ancient place names based on Pleiades and Spacy.☆24Sep 15, 2020Updated 5 years ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Jun 22, 2021Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 10 months ago
- Ransomware Dataset for arXiv:1609.03020☆30Dec 29, 2021Updated 4 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆191Jan 6, 2026Updated last month
- Overview For this assignment you will be developing an application that uses raw IP sockets to ‘walk’ around an ordered list of nodes (g…☆28Apr 10, 2015Updated 10 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago