ait-aecid / logdata-anomaly-minerView external linksLinks
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆91Jan 12, 2026Updated last month
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- LogLead stands for Log Loader, Enhancer, and Anomaly Detector.☆30Sep 12, 2025Updated 5 months ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆21Feb 22, 2025Updated 11 months ago
- The final project of deep learning and practice (summer 2020) in NCTU.☆28Jun 29, 2022Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- ☆11Oct 16, 2017Updated 8 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Log-based anomaly detection☆14Jul 2, 2025Updated 7 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Repository for Content-Aware Transformer☆16Feb 20, 2023Updated 2 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- TAXII Server supporting the 2.1 spec.☆20Mar 30, 2020Updated 5 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Firepit - STIX Columnar Storage☆17Jun 5, 2024Updated last year
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- [AAAI 2024] LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection☆51May 27, 2024Updated last year
- A MAL language that demonstrates the Maven project structure☆23Feb 5, 2026Updated last week
- A toolkit for hybrid log parsing☆18Aug 23, 2023Updated 2 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 2 months ago
- ☆19Oct 30, 2020Updated 5 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆94May 22, 2024Updated last year
- A list of awesome research on log analysis, anomaly detection, fault localization, and AIOps☆786Dec 31, 2023Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- ☆30Jul 28, 2024Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- self-hosted Azure OSINT tool☆32Jun 24, 2025Updated 7 months ago
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year