adobe / OSASLinks
One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and static rules; (b) anomaly scoring using supervised and unsupervised machine learning.
☆153Updated 2 weeks ago
Alternatives and similar repositories for OSAS
Users that are interested in OSAS are comparing it to the libraries listed below
Sorting:
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆314Updated last month
- A Python library to help with some common threat hunting data analysis operations☆142Updated 2 years ago
- Structured Threat Intelligence Graph☆93Updated 2 months ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 6 months ago
- Website crawler with YARA detection☆88Updated last year
- ☆48Updated 4 months ago
- ☆28Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆82Updated last year
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆281Updated last year
- Cisco Orbital - Osquery queries by Talos☆131Updated 9 months ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆261Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- ☆45Updated 2 months ago
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆52Updated 2 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Serverless honeytoken 🕵🏻♂️☆79Updated 2 years ago
- A standard for reducing log volume without sacrificing analytical capability☆205Updated 3 months ago
- Simple yara rule manager☆66Updated 2 years ago
- ☆100Updated 4 years ago
- ☆19Updated 4 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆164Updated 11 months ago
- 1-Click push forensics evidence to the cloud☆141Updated 11 months ago
- ☆221Updated last year
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- ☆118Updated last year