adobe / tripodLinks
Tripod is a tool/ML model for computing latent representations for large sequences
☆16Updated 2 months ago
Alternatives and similar repositories for tripod
Users that are interested in tripod are comparing it to the libraries listed below
Sorting:
- ☆30Updated 7 years ago
- Data Feed Manager (news watch orchestrator to predict topic with deepdetect and store cleaned text in elasticsearch)☆40Updated 2 years ago
- Detect Sensitive REST API communication using Deep Neural Networks☆46Updated 2 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 5 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆23Updated last year
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- List of Sanctions and Most wanted☆28Updated 8 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- My notes on various topics☆64Updated last year
- A statistical framework for graph anomaly detection.☆17Updated 6 years ago
- Scrape real-time Dark Web data across Tor to your local kafka network☆14Updated 9 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- HoneyDB Python Module☆13Updated last year
- Drill down into your python logs using JSON logs stored in Splunk - supports sending over TCP or the Splunk HEC REST API handlers (using …☆12Updated 2 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 3 weeks ago
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆28Updated 3 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 5 months ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Updated 4 years ago
- It is a linux based tool,which it has been developed for learning penetration testing and about the vulnerabilities.it is written in pyth…☆15Updated 5 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Updated 7 years ago
- ☆16Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- White hat hacking passwords using ML☆54Updated 4 years ago