adobe / OSASLinks
One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and static rules; (b) anomaly scoring using supervised and unsupervised machine learning.
☆155Updated last month
Alternatives and similar repositories for OSAS
Users that are interested in OSAS are comparing it to the libraries listed below
Sorting:
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆120Updated last week
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆323Updated 8 months ago
- A collaborative platform for creating, editing and sharing JSON objects.☆74Updated last week
- A platform built for easy-to-use automated network traffic analysis☆60Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated 2 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 2 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 6 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆32Updated 5 months ago
- Structured Threat Intelligence Graph☆97Updated last month
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Updated 5 months ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆31Updated last year
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆275Updated last week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 8 months ago
- Firepit - STIX Columnar Storage☆17Updated last year
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- ☆30Updated 7 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆267Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated this week
- Generate network maps from packet captures☆30Updated 6 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago