adobe / stringlifierLinks
Stringlifier is on Opensource ML Library for detecting random strings in raw text. It can be used in sanitising logs, detecting accidentally exposed credentials and as a pre-processing step in unsupervised ML-based analysis of application text data.
☆168Updated 5 months ago
Alternatives and similar repositories for stringlifier
Users that are interested in stringlifier are comparing it to the libraries listed below
Sorting:
- ☆224Updated 2 years ago
- Hfinger - fingerprinting HTTP requests☆139Updated 2 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆478Updated 2 years ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- Security ML models encoded as Yara rules☆213Updated 2 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 7 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆126Updated last year
- Open-source framework to detect outliers in Elasticsearch events☆209Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆97Updated 5 months ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆156Updated 6 months ago
- ☆93Updated 3 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆172Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- PyPI malware packages☆58Updated 6 years ago
- Parse YARA rules and operate over them more easily.☆192Updated 9 months ago
- Defanged Indicator of Compromise (IOC) Extractor.☆552Updated last year
- GPT-3 use cases for Cybersecurity☆52Updated 2 years ago
- Vulnerability Information Aggregator for CVEs☆123Updated 6 years ago
- simple YARA-based IOC scanner☆170Updated last month
- My notes on various topics☆67Updated 2 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆99Updated last year
- A python package for use in generating fake data for SOC and security automation.☆171Updated 8 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- ☆166Updated 4 years ago
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3☆109Updated 3 months ago
- IOC from articles, tweets for archives☆319Updated last year
- Minimal, consistent Python API for building integrations with malware sandboxes.☆141Updated last year
- CVE.ICU code.☆47Updated this week