Identify malicious behavior and attacks using Machine Learning with Python
☆49Jan 17, 2017Updated 9 years ago
Alternatives and similar repositories for Network-Log-and-Traffic-Analysis
Users that are interested in Network-Log-and-Traffic-Analysis are comparing it to the libraries listed below
Sorting:
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Malware detection by entropy - ascii entropy and binary entropy☆10Mar 19, 2017Updated 9 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- An abp application module to help you query and manage your application logs.☆10Dec 20, 2025Updated 3 months ago
- 一个flask的web界面扫描,主要是仿照网上的一位前辈的代码;有cms识别,cms漏洞检测,子域名扫描等☆12Feb 7, 2019Updated 7 years ago
- Code for a tutorial on how to use the IBM Log Analysis and monitoring with IBM Cloud Monitoring☆11Sep 16, 2024Updated last year
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- 哈工大毕业设计:面向网络靶场的自适应仿真流量生成技术☆15Jun 9, 2022Updated 3 years ago
- Detection of copy-move forgeries in images using image-signal representation methods☆11Apr 28, 2018Updated 7 years ago
- 本科毕设项目☆17Jun 12, 2020Updated 5 years ago
- 安全图谱☆17Apr 19, 2025Updated 11 months ago
- Splunking Crime using Splunk Machine Learning Toolkit☆11Dec 14, 2018Updated 7 years ago
- Model analysis tools for TensorFlow☆11Oct 27, 2019Updated 6 years ago
- Drill down into your python logs using JSON logs stored in Splunk - supports sending over TCP or the Splunk HEC REST API handlers (using …☆13Oct 18, 2022Updated 3 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 3 years ago
- ChatterBot: Machine learning in Python ChatterBot ChatterBot is a machine-learning based conversational dialog engine build in Python whi…☆11Dec 18, 2019Updated 6 years ago
- 智能医疗推荐问答App 推荐算法:协同过滤,基于内容,神经网络 搜索引擎:ElasticSearch、word2vec/IK分词搜索、知识图谱 IM系统:SpringCloud系列,Netty 终端:Android、JNI 大数据:Hadoop、Spark、Flink、…☆25Sep 26, 2025Updated 5 months ago
- A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.☆13Jan 22, 2018Updated 8 years ago
- Library management system using python☆11Mar 13, 2019Updated 7 years ago
- CVE-2024-53691☆13Jan 13, 2025Updated last year
- 基于 CNN + LSTM 的网络流量检测☆23Mar 30, 2023Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- This is a scripted input that reads one or more logs from Salesforce Commerce Cloud (SFCC) into Splunk. This script can be configured to …☆11Mar 12, 2019Updated 7 years ago
- LSTM and MLP for sql injection detection☆26Dec 9, 2018Updated 7 years ago
- RFM (recency, frequency, monetary) analysis☆13Aug 11, 2018Updated 7 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- 毕业设计京东商品评论爬虫分析☆14May 16, 2019Updated 6 years ago
- Peach Fuzzer 3.x☆23Apr 7, 2016Updated 9 years ago
- 鉴势-工控系统信息安全及态势感知系统☆18Jan 6, 2019Updated 7 years ago
- Collection of dynamic security related helpers☆16Dec 9, 2022Updated 3 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Splunk TA to provide both modular inputs and a modular alert for synchronizing KVStore content across Splunk Instances.☆14Jul 9, 2020Updated 5 years ago
- Small example on how you can detect multicollinearity☆13May 29, 2021Updated 4 years ago
- ☆13Oct 18, 2025Updated 5 months ago
- Hands-On-Big-Data-Modeling, Published by Packt☆33Jan 30, 2023Updated 3 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Deep and Dark Web OSINT Tool☆10Sep 18, 2018Updated 7 years ago