alexfrancow / A-DetectorLinks
An anomaly-based intrusion detection system.
☆86Updated 2 years ago
Alternatives and similar repositories for A-Detector
Users that are interested in A-Detector are comparing it to the libraries listed below
Sorting:
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- My notes on various topics☆67Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 3 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Detecting Lateral Movement with Machine Learning☆139Updated 8 years ago
- Malware/IOC ingestion and processing engine☆107Updated 6 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆50Updated 2 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- ☆138Updated 6 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Updated 3 weeks ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated 2 weeks ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Python API for the CVSS v3☆58Updated 4 years ago
- ☆46Updated 8 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- defplorex for BlackHat Arsenal☆114Updated 8 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago