adobe / OSASLinks
One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and static rules; (b) anomaly scoring using supervised and unsupervised machine learning.
☆156Updated last month
Alternatives and similar repositories for OSAS
Users that are interested in OSAS are comparing it to the libraries listed below
Sorting:
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆330Updated 9 months ago
- A CVE Heatmap Using CalPlot☆97Updated 5 years ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆119Updated 2 weeks ago
- A collaborative platform for creating, editing and sharing JSON objects.☆75Updated 2 weeks ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago
- ☆30Updated 7 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 6 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 3 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- A platform built for easy-to-use automated network traffic analysis☆60Updated 3 years ago
- Firepit - STIX Columnar Storage☆17Updated last year
- Tools to assist in forensicating docker☆86Updated 11 months ago
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 3 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆277Updated last week
- A Tool for Complex and Scalable Data Access Policy Enforcement☆97Updated 4 years ago
- Structured Threat Intelligence Graph☆99Updated last month
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Updated 4 years ago
- Hosted analyzers built for Grapl☆14Updated 3 years ago
- Vendor Security Model Contract☆97Updated 3 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- ☆22Updated 4 years ago
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆59Updated 3 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆55Updated last month
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Updated 3 weeks ago
- Create complex tools execution Workflows for working together☆23Updated 4 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 6 years ago