This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆91Jan 12, 2026Updated last month
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- Share secrets encrypted☆14Mar 2, 2026Updated last week
- ☆20Nov 14, 2024Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- ☆11Oct 16, 2017Updated 8 years ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Implementation of "Reconstruction-based Anomaly Detection with Completely Random Forest," SIAM International Conference on Data Mining (S…☆10Feb 16, 2021Updated 5 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- A MAL language that demonstrates the Maven project structure☆23Feb 27, 2026Updated last week
- A toolkit for hybrid log parsing☆18Aug 23, 2023Updated 2 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 3 months ago
- ☆19Oct 30, 2020Updated 5 years ago
- A sample implementation of the in kernel 4.11 introduced statx-systemcall☆22Jan 12, 2026Updated last month
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Mar 1, 2026Updated last week
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Jul 30, 2024Updated last year
- ☆24Mar 19, 2020Updated 5 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- ☆30Jul 28, 2024Updated last year
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- ☆25Jun 25, 2021Updated 4 years ago
- OwlH Master API☆24Apr 27, 2025Updated 10 months ago