alexfrancow / A-DetectorLinks
An anomaly-based intrusion detection system.
☆85Updated 3 years ago
Alternatives and similar repositories for A-Detector
Users that are interested in A-Detector are comparing it to the libraries listed below
Sorting:
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- My notes on various topics☆67Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- ☆52Updated 7 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆104Updated last week
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆60Updated last week
- Distributed Network Vulnerability Scanner☆124Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 4 months ago
- ☆46Updated 8 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- An SDN penetration testing toolkit☆117Updated last year
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆69Updated 2 months ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 5 months ago
- intrusion detection☆24Updated 8 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆40Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago
- defplorex for BlackHat Arsenal☆115Updated 8 years ago
- Detecting Lateral Movement with Machine Learning☆139Updated 8 years ago
- Botnet Simulation Framework☆77Updated 5 years ago