adobe / stringlifierLinks
Stringlifier is on Opensource ML Library for detecting random strings in raw text. It can be used in sanitising logs, detecting accidentally exposed credentials and as a pre-processing step in unsupervised ML-based analysis of application text data.
☆168Updated 4 months ago
Alternatives and similar repositories for stringlifier
Users that are interested in stringlifier are comparing it to the libraries listed below
Sorting:
- ☆222Updated last year
- Hfinger - fingerprinting HTTP requests☆139Updated 2 years ago
- Security ML models encoded as Yara rules☆213Updated 2 years ago
- A tool to extract structured cyber information from incident reports.☆81Updated 7 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆477Updated last year
- Parse YARA rules and operate over them more easily.☆191Updated 7 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 6 months ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆170Updated last year
- Open-source framework to detect outliers in Elasticsearch events☆209Updated 2 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆154Updated 5 months ago
- ☆93Updated 3 years ago
- simple YARA-based IOC scanner☆169Updated last month
- My notes on various topics☆65Updated last year
- Vulnerability Information Aggregator for CVEs☆122Updated 6 years ago
- A python package for use in generating fake data for SOC and security automation.☆170Updated 6 months ago
- Python API wrapper for the Joe Sandbox API.☆66Updated last year
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆181Updated 6 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 2 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- Website crawler with YARA detection☆89Updated 2 years ago
- ☆101Updated 4 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆549Updated last year
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 5 months ago
- CVE.ICU code.☆46Updated this week
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago