This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆91Jan 12, 2026Updated 2 months ago
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LogLead stands for Log Loader, Enhancer, and Anomaly Detector.☆30Feb 17, 2026Updated last month
- Share secrets encrypted☆14Mar 22, 2026Updated last week
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆49Mar 18, 2026Updated last week
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆12Dec 1, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆28Jul 9, 2025Updated 8 months ago
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 3 years ago
- Log-based anomaly detection☆14Jul 2, 2025Updated 8 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- log anomaly detection toolkit including DeepLog☆452Apr 23, 2020Updated 5 years ago
- LogTAD: Unsupervised Cross-system Log Anomaly Detection via Domain Adaptation (CIKM 2021)☆27Mar 18, 2026Updated last week
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- The final project of deep learning and practice (summer 2020) in NCTU.☆29Jun 29, 2022Updated 3 years ago
- [AAAI 2024] LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection☆53May 27, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of PLELog in ICSE 2021 accepted paper:Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation.☆81May 16, 2023Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Updated this week
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Natural Language or Not☆11Jun 20, 2022Updated 3 years ago
- Brain: Log Parsing with Bidirectional Parallel Tree☆39Jun 13, 2025Updated 9 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- PyTorch implements "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning"☆99Jun 22, 2025Updated 9 months ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- SSL certificate authority script package for creating and signing your own SSL/TLS certificates☆11Nov 28, 2025Updated 4 months ago
- Official implementation of "FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination"☆11Apr 17, 2024Updated last year
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- A list of awesome research on log analysis, anomaly detection, fault localization, and AIOps☆789Dec 31, 2023Updated 2 years ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Large-scale Botnet DDoS Attack Simulation Framework☆10Jul 15, 2025Updated 8 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆65Nov 19, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- A protocol testing platform that simulates network conditions and peer behavior to produce programmer-friendly benchmark data☆12Jan 4, 2019Updated 7 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- Sample solution to automate tedious regulatory compliance processes using multi-agent systems☆24Apr 15, 2025Updated 11 months ago
- A network control-plane simulator☆19Mar 11, 2026Updated 2 weeks ago
- 高性能 高精度 高稳定的 Nginx-Waf 防火墙 护网神器; Nginx WAF With High Performance, Accuracy And Stability;☆23May 16, 2022Updated 3 years ago