Scripts to deploy virtual testbed for log data analysis and anomaly detection.
☆27Nov 21, 2023Updated 2 years ago
Alternatives and similar repositories for kyoushi-environment
Users that are interested in kyoushi-environment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆28Jul 9, 2025Updated 8 months ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- ☆86Mar 29, 2023Updated 3 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 3 years ago
- Implementation of Voice over IP in Python☆18Jul 23, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆10Jan 4, 2024Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 5 months ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- 数据隐写:将数据嵌入到到 BMP 数据中☆11Oct 28, 2020Updated 5 years ago
- ☆126May 3, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Web Attacks Detection based on CNN☆17Apr 6, 2019Updated 6 years ago
- A Python implementation of the Hopfield network used to solve the traveling salesman problem☆10Apr 11, 2019Updated 6 years ago
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆12Dec 1, 2023Updated 2 years ago
- Log-based anomaly detection☆14Jul 2, 2025Updated 8 months ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆15Aug 16, 2023Updated 2 years ago
- ☆13Sep 22, 2017Updated 8 years ago
- ☆13May 28, 2025Updated 10 months ago
- systemd sockets for node.js applications☆13Jul 12, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Enrich IP addresses with metadata and threat intelligence indicators.☆24Aug 12, 2023Updated 2 years ago
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- ☆22Oct 22, 2024Updated last year
- AIBOM Workshop RSA 2024☆15May 20, 2024Updated last year
- A generalized score-based method for Causal Discovery☆19Nov 3, 2020Updated 5 years ago
- ☆14Apr 11, 2024Updated last year
- ☆20Nov 14, 2024Updated last year