This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆90Jan 12, 2026Updated 3 months ago
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Share secrets encrypted☆15Apr 9, 2026Updated last week
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆13Dec 1, 2023Updated 2 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆29Jul 9, 2025Updated 9 months ago
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Code for "Pre-training with Contrastive Learning for Unified Log Analytics"☆20Jan 22, 2024Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Repository for Content-Aware Transformer☆16Feb 20, 2023Updated 3 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆16Nov 23, 2024Updated last year
- Log Parsing with Prompt-based Few-shot Learning (ICSE 2023, Technical Track)☆72Sep 10, 2025Updated 7 months ago
- [AAAI 2024] LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection☆51May 27, 2024Updated last year
- Implementation of PLELog in ICSE 2021 accepted paper:Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation.☆78May 16, 2023Updated 2 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated 2 weeks ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 10 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- Large-scale Botnet DDoS Attack Simulation Framework☆10Jul 15, 2025Updated 9 months ago
- A Large-scale Evaluation for Log Parsing Techniques: How Far are We? [ISSTA'24]☆140Oct 8, 2025Updated 6 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆66Nov 19, 2025Updated 5 months ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- collection template ref implementation☆11Mar 13, 2025Updated last year
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Heterogeneous effects analysis of conjoint experiments using BART☆10Sep 6, 2023Updated 2 years ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆94May 22, 2024Updated last year
- Full pipeline for log analysis and anomaly detection.☆18Feb 11, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of "Reconstruction-based Anomaly Detection with Completely Random Forest," SIAM International Conference on Data Mining (S…☆10Feb 16, 2021Updated 5 years ago
- Deep Learning framework for fast and clean research with Pytorch☆13Oct 9, 2020Updated 5 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- ☆14Aug 28, 2022Updated 3 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 6 months ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago