Scripts to generate and analyze the AIT alert data set (AIT-ADS)
☆31Jul 9, 2025Updated 10 months ago
Alternatives and similar repositories for alert-data-set
Users that are interested in alert-data-set are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 7 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆57Mar 16, 2026Updated 2 months ago
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆90Jan 12, 2026Updated 4 months ago
- Academic research rootkit using ftrace-hooking to hide files and processes via magic word or user/group. Tested until Linux 6.11.☆47Jun 5, 2025Updated 11 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- Analysis scripts for log data sets used in anomaly detection.☆84Oct 19, 2025Updated 7 months ago
- ☆25Jun 11, 2021Updated 4 years ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆70Nov 19, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for "Pre-training with Contrastive Learning for Unified Log Analytics"☆21Jan 22, 2024Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- ☆88Feb 24, 2025Updated last year
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆50Updated this week
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- Former home Java language client (master) for SWI-Prolog pengines - see simularity/JavaPengine☆10May 8, 2016Updated 10 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Includes simple docker structure for machine learning projects.☆14Feb 8, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated last year
- LogLead performs log loading, log enhancement, log feature engineering, log analysis, log anomaly detection.☆30Feb 17, 2026Updated 3 months ago
- Have fun with audit log analysis :)☆155May 5, 2024Updated 2 years ago
- Yes, Erlang in SWI-Prolog!☆12Jun 18, 2018Updated 7 years ago
- ☆31Nov 19, 2025Updated 6 months ago
- [AAAI 2024] LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection☆52May 27, 2024Updated last year
- A static analysis tool for Java programs, based on the theory of code property graphs.☆20Mar 27, 2023Updated 3 years ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- Print the uncompressed size of a GZip file.☆14Sep 16, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Small enough to carry on your back (Backpack) 🎒💻☆32Jun 3, 2023Updated 2 years ago
- ☆25Dec 10, 2022Updated 3 years ago
- 通过微信公众号推送漏洞消息☆18Dec 27, 2021Updated 4 years ago
- Install and manage the autosign gem, to faciliate puppet certificate policy autosigning☆11Apr 27, 2026Updated 3 weeks ago
- some tools plugins☆14May 24, 2023Updated 2 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆33Mar 4, 2020Updated 6 years ago
- Debian Baseimages☆16May 15, 2026Updated last week