adobe / OSAS
One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and static rules; (b) anomaly scoring using supervised and unsupervised machine learning.
☆152Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for OSAS
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆293Updated 2 weeks ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- A Python library to help with some common threat hunting data analysis operations☆139Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆171Updated last month
- Extension to Cuckoo Sandbox open source projects, adds support to AWS cloud functionalities and enables running emulation on auto-scaling…☆136Updated 2 years ago
- ☆48Updated 7 months ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆258Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 4 months ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆267Updated 10 months ago
- ☆93Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- Synapse Central Intelligence System☆359Updated this week
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆251Updated this week
- ☆114Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆200Updated last month
- A CVE Heatmap Using CalPlot☆98Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆208Updated 2 years ago
- A framework for orchestrating forensic collection, processing and data export☆296Updated this week
- 1-Click push forensics evidence to the cloud☆139Updated 4 months ago
- An open source framework for enterprise level automated analysis.☆393Updated 2 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆67Updated this week
- Structured Threat Intelligence Graph☆87Updated 3 weeks ago
- Cisco Orbital - Osquery queries by Talos☆123Updated 2 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆168Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆252Updated this week
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago