alexfrancow / A-DetectorLinks
An anomaly-based intrusion detection system.
☆86Updated 3 years ago
Alternatives and similar repositories for A-Detector
Users that are interested in A-Detector are comparing it to the libraries listed below
Sorting:
- My notes on various topics☆67Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 4 months ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆80Updated 7 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Updated 5 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 8 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- An SDN penetration testing toolkit☆117Updated last year
- ☆52Updated 7 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆60Updated last month
- ☆138Updated 6 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆69Updated last month
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 months ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- ☆46Updated 8 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago