acising / KellectAgent-WindowsLinks
windows kernel event log collect
☆121Updated last week
Alternatives and similar repositories for KellectAgent-Windows
Users that are interested in KellectAgent-Windows are comparing it to the libraries listed below
Sorting:
- PhishIntention: Phishing detection through webpage intention☆252Updated 2 months ago
- Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21☆342Updated 3 months ago
- Enterprise Security Data Pipeline Platform (SDPP) with Integrated Real-Time Threat Detection Engine☆216Updated this week
- 💽 A simple Intel x86 operating system written in assembly and C++, supporting interrupts, memory paging and heap allocation, disk contro…☆35Updated 2 months ago
- Remote IDA Call, a python package that allows you to call IDA functions from a remote process.☆118Updated 2 weeks ago
- Software Security Vulnerability Hub☆129Updated last month
- demo PsExec☆127Updated 3 years ago
- 该Agent是一个基于eBPF技术的容器异常检测框架,旨在通过收集容器的行为特征和指标特征,利用人工智能算法自动识别具有异常行为的容器。☆117Updated 6 months ago
- Tensorflow环境下,基于CNN算法,KD99与网络数据训练集共3000w数据训练,在19w数据与1w攻检验下,模型准确率为92.8%.☆66Updated 3 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆78Updated 2 years ago
- A.S.E (AICGSecEval) is a repository-level AI-generated code security evaluation benchmark developed by Tencent Wukong Code Security Team.☆710Updated this week
- AntiRec is a cross-platform app that uses advanced audio processing to subtly alter microphone input, preventing ASR recognition while ke…☆188Updated 2 months ago
- Modern patch, written in Python. 现代化的 Patch 工具。☆104Updated 6 months ago
- A plugin for IDA that renames functions by system call numbers.☆206Updated 2 years ago
- ☆29Updated 7 months ago
- Repo for paper *Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges*☆277Updated 4 months ago
- ConcoLLMic: the first language- and theory-agonistic concolic execution engine via LLM agents☆70Updated last month
- The PyTorch implementation for "BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection"☆56Updated last month
- 一款专注于python object的调试器☆53Updated 5 months ago
- ☆241Updated last year
- Practical Detection of Trojan Neural Networks☆120Updated 4 years ago
- ☆32Updated last year
- A reading list for MLSecOps!☆142Updated 7 months ago
- DongTai API SDK☆41Updated 3 years ago
- 【原创最强程序,专注于ETH/ETC转发】性能强大,功能齐全,体验拉满,匹配专业机;开发费恒定!无论你抽3%还是30%,都是0.3%开发费!;支持专业机,精确到单台设备的24小时数据统计、支持加密隧道!体验拉满的minerproxy;无视CC攻击,不怕扫描攻击,内置加密证书…☆194Updated 2 years ago
- [ICLR 23] Differentiable Learning of Temporal Logical Rules on Knowledge Graphs☆44Updated 10 months ago
- This is the public code repository of paper 'Comprehensive Assessment of Jailbreak Attacks Against LLMs'☆85Updated last year
- 【全网最强】minerproxy矿池中转,原创minerproxy,唯一正版,性能强大, 功能齐全, 9000台无压力不崩溃,BTC ETC ETH LTC DNX ALEO ETU ETHW ETHF ERGO RVN CFX ETC等全币种无损抽水,体验拉满的miner…☆164Updated last year
- use sklearn to detect two types of network attacks☆34Updated 6 years ago
- A tool to download pixiv illustrations☆108Updated last year