adobe / OSASLinks
One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and static rules; (b) anomaly scoring using supervised and unsupervised machine learning.
☆153Updated last month
Alternatives and similar repositories for OSAS
Users that are interested in OSAS are comparing it to the libraries listed below
Sorting:
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆121Updated last year
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆318Updated 3 months ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆265Updated last week
- ☆48Updated 5 months ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 3 weeks ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- Cisco Orbital - Osquery queries by Talos☆134Updated 10 months ago
- A Passive SSH back-end and scanner.☆103Updated last month
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- Tools to assist in forensicating docker☆84Updated 4 months ago
- A collaborative platform for creating, editing and sharing JSON objects.☆73Updated 2 weeks ago
- A standard for reducing log volume without sacrificing analytical capability☆206Updated 4 months ago
- Synapse Central Intelligence System☆417Updated this week
- ☆100Updated 4 years ago
- ☆221Updated last year
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 5 years ago
- MSR Project Freta☆77Updated 11 months ago
- Vendor Security Model Contract☆98Updated 3 years ago
- Firepit - STIX Columnar Storage☆16Updated last year
- 1-Click push forensics evidence to the cloud☆141Updated last year
- Osquery Resources☆61Updated 5 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 8 months ago
- Website crawler with YARA detection☆88Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Structured Threat Intelligence Graph☆95Updated 3 months ago