adobe / stringlifierLinks
Stringlifier is on Opensource ML Library for detecting random strings in raw text. It can be used in sanitising logs, detecting accidentally exposed credentials and as a pre-processing step in unsupervised ML-based analysis of application text data.
☆170Updated 8 months ago
Alternatives and similar repositories for stringlifier
Users that are interested in stringlifier are comparing it to the libraries listed below
Sorting:
- ☆227Updated 2 months ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- Hfinger - fingerprinting HTTP requests☆141Updated 2 years ago
- Security ML models encoded as Yara rules☆215Updated 2 years ago
- Open-source framework to detect outliers in Elasticsearch events☆208Updated 2 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆477Updated 2 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 10 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆107Updated last month
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆179Updated 2 years ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆182Updated 6 years ago
- Parse YARA rules and operate over them more easily.☆195Updated 11 months ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆141Updated last year
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3☆116Updated 5 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆162Updated 10 months ago
- My notes on various topics☆67Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 6 months ago
- A CVE Heatmap Using CalPlot☆97Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Updated 7 months ago
- ☆93Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆212Updated 3 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- Python wrapper for ssdeep fuzzy hashing library☆151Updated 4 years ago
- A native and unofficial implementation of p0f3 in Python with extra analysis features: It's p0f3+!☆26Updated 3 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆161Updated last week
- Static Token And Credential Scanner☆95Updated 2 years ago
- NVD/CVE as JSON files☆124Updated this week
- One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and sta…☆155Updated last month