adobe / OSASLinks
One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and static rules; (b) anomaly scoring using supervised and unsupervised machine learning.
☆153Updated last week
Alternatives and similar repositories for OSAS
Users that are interested in OSAS are comparing it to the libraries listed below
Sorting:
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- A collaborative platform for creating, editing and sharing JSON objects.☆74Updated last month
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆319Updated 4 months ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆121Updated last year
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆29Updated last year
- Serverless honeytoken 🕵🏻♂️☆80Updated 2 years ago
- A Passive SSH back-end and scanner.☆103Updated last month
- Firepit - STIX Columnar Storage☆16Updated last year
- ☆30Updated 7 years ago
- Tools to assist in forensicating docker☆84Updated 5 months ago
- Structured Threat Intelligence Graph☆95Updated 4 months ago
- A Python implementation of the Community ID flow hashing standard☆23Updated last year
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 4 months ago
- MSR Project Freta☆77Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 3 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- ☆19Updated 4 years ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆266Updated this week
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- You're busted!☆26Updated 5 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated last month
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- ☆93Updated 2 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago