adobe / stringlifier
Stringlifier is on Opensource ML Library for detecting random strings in raw text. It can be used in sanitising logs, detecting accidentally exposed credentials and as a pre-processing step in unsupervised ML-based analysis of application text data.
☆164Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for stringlifier
- ☆219Updated last year
- A Python package to interact with the Mitre ATT&CK Framework☆468Updated last year
- Defanged Indicator of Compromise (IOC) Extractor.☆506Updated 2 months ago
- ☆93Updated 2 years ago
- Regipy is an os independent python library for parsing offline registry hives☆244Updated 2 months ago
- STIX2 graph visualisation library in JS☆85Updated this week
- A Python library to help with some common threat hunting data analysis operations☆139Updated last year
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆141Updated this week
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆346Updated 3 years ago
- Open-source framework to detect outliers in Elasticsearch events☆205Updated last year
- ☆27Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- A tool to extract structured cyber information from incident reports.☆78Updated 6 years ago
- Hfinger - fingerprinting HTTP requests☆132Updated last year
- PyPI malware packages☆58Updated 5 years ago
- Parse YARA rules and operate over them more easily.☆174Updated 4 months ago
- One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and sta…☆152Updated 7 months ago
- simple YARA-based IOC scanner☆164Updated this week
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆116Updated last year
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆300Updated last month
- A framework for orchestrating forensic collection, processing and data export☆296Updated this week
- IOC from articles, tweets for archives☆311Updated 11 months ago
- Swagger/ OpenAPI specifications for security products and services☆73Updated last month
- Security ML models encoded as Yara rules☆211Updated last year
- ☆158Updated 3 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆202Updated 4 years ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆175Updated 5 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆240Updated last year
- CASCADE Server☆264Updated last year
- An open source framework for enterprise level automated analysis.☆393Updated 2 years ago