adobe / OSAS
One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and static rules; (b) anomaly scoring using supervised and unsupervised machine learning.
☆153Updated 11 months ago
Alternatives and similar repositories for OSAS:
Users that are interested in OSAS are comparing it to the libraries listed below
- ☆47Updated 2 months ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆303Updated 4 months ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 8 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆130Updated 7 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- A Python library to help with some common threat hunting data analysis operations☆142Updated last year
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆261Updated 2 years ago
- ☆218Updated last year
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago
- ☆27Updated 4 years ago
- MSR Project Freta☆76Updated 8 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆176Updated 6 months ago
- A python package for use in generating fake data for SOC and security automation.☆168Updated 3 weeks ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- A Workflow for Data Scientists to bring Jupyter Notebook Visualizations to Kibana Dashboards☆45Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆258Updated last week
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆323Updated 6 months ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Website crawler with YARA detection☆88Updated last year
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- A Passive SSH back-end and scanner.☆102Updated 3 weeks ago
- Automatically create YARA rules from malicious documents.☆210Updated 2 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 11 months ago
- ☆117Updated last year