This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆90Jan 12, 2026Updated 4 months ago
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Analysis scripts for log data sets used in anomaly detection.☆84Oct 19, 2025Updated 7 months ago
- LogLead performs log loading, log enhancement, log feature engineering, log analysis, log anomaly detection.☆30Feb 17, 2026Updated 3 months ago
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆49Updated this week
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆13Dec 1, 2023Updated 2 years ago
- ☆21Nov 14, 2024Updated last year
- Academic research rootkit using ftrace-hooking to hide files and processes via magic word or user/group. Tested until Linux 6.11.☆47Jun 5, 2025Updated 11 months ago
- Anomaly detection is a critical step towards building a secure and trustworthy system. The primary purpose of a system log is to record s…☆14Dec 7, 2021Updated 4 years ago
- Log-based anomaly detection☆14Jul 2, 2025Updated 10 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- log anomaly detection toolkit including DeepLog☆458Apr 23, 2020Updated 6 years ago
- Repository for Content-Aware Transformer☆16Feb 20, 2023Updated 3 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Log Parsing with Prompt-based Few-shot Learning (ICSE 2023, Technical Track)☆72Sep 10, 2025Updated 8 months ago
- LogTAD: Unsupervised Cross-system Log Anomaly Detection via Domain Adaptation (CIKM 2021)☆27Apr 18, 2026Updated last month
- The final project of deep learning and practice (summer 2020) in NCTU.☆29Jun 29, 2022Updated 3 years ago
- Implementation of PLELog in ICSE 2021 accepted paper:Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation.☆80May 16, 2023Updated 3 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- A sample implementation of the in kernel 4.11 introduced statx-systemcall☆22Jan 12, 2026Updated 4 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated last month
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆57Mar 16, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 11 months ago
- Brain: Log Parsing with Bidirectional Parallel Tree☆40Jun 13, 2025Updated 11 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- SSL certificate authority script package for creating and signing your own SSL/TLS certificates☆11Nov 28, 2025Updated 5 months ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Spell is a Streaming Parser for Event Logs using an LCS (Longest Common Subsequence)☆17Jun 3, 2019Updated 6 years ago
- A list of awesome research on log analysis, anomaly detection, fault localization, and AIOps☆796Dec 31, 2023Updated 2 years ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- A Large-scale Evaluation for Log Parsing Techniques: How Far are We? [ISSTA'24]☆146Oct 8, 2025Updated 7 months ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- A simple fuzzy matching set for python strings☆10Nov 25, 2024Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago