adobe / stringlifierLinks
Stringlifier is on Opensource ML Library for detecting random strings in raw text. It can be used in sanitising logs, detecting accidentally exposed credentials and as a pre-processing step in unsupervised ML-based analysis of application text data.
☆167Updated last month
Alternatives and similar repositories for stringlifier
Users that are interested in stringlifier are comparing it to the libraries listed below
Sorting:
- ☆221Updated last year
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Hfinger - fingerprinting HTTP requests☆139Updated 2 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆167Updated last year
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆151Updated 2 months ago
- Security ML models encoded as Yara rules☆214Updated 2 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆476Updated last year
- Defanged Indicator of Compromise (IOC) Extractor.☆537Updated 10 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated last month
- Open-source framework to detect outliers in Elasticsearch events☆209Updated 2 years ago
- Parse YARA rules and operate over them more easily.☆191Updated 5 months ago
- ☆100Updated 4 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and sta…☆153Updated last month
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 3 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆155Updated 3 months ago
- ☆28Updated 4 years ago
- IOC from articles, tweets for archives☆314Updated last year
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆125Updated 8 months ago
- ☆93Updated 2 years ago
- Python API wrapper for the Joe Sandbox API.☆67Updated last year
- A python package for use in generating fake data for SOC and security automation.☆169Updated 4 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆250Updated 2 years ago
- Vulnerability Information Aggregator for CVEs☆122Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆437Updated last year
- Python wrapper for ssdeep fuzzy hashing library☆151Updated 3 years ago
- PyPI malware packages☆58Updated 6 years ago
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆315Updated 9 months ago