An anomaly-based intrusion detection system.
☆85Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for A-Detector
Users that are interested in A-Detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts to help to detect anomalies in pcap file. Anomaly Detection using tensorflow and tshark.☆83Mar 1, 2026Updated 3 weeks ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Network traffic data pipeline for real-time predictions and building datasets for deep neural networks☆53Sep 4, 2020Updated 5 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- Minimal docker container of Parrot OS for running an automated scan & pentest report.☆195Jul 13, 2023Updated 2 years ago
- Adhoc scripts☆30Feb 12, 2017Updated 9 years ago
- vulnerable single sign on☆149Aug 1, 2024Updated last year
- CSE-CIC-IDS-2018 analyze with Random Forest☆30Apr 4, 2021Updated 4 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated last year
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Funnel is a lightweight yara-based feed scraper☆38May 22, 2023Updated 2 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆681Oct 28, 2023Updated 2 years ago
- script to brute force ssh or ftp passwords☆12Jul 22, 2016Updated 9 years ago
- .NET Deserialization Passive Scanner☆46Mar 23, 2018Updated 8 years ago
- Machine learning plugins for network traffic☆125Aug 29, 2023Updated 2 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆431Jan 6, 2026Updated 2 months ago
- A generator for malicious DLL files for DLL Hijacking attacks☆33Dec 6, 2019Updated 6 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- Network Traffic Identification with Convolutional Neural Networks☆27Jan 23, 2019Updated 7 years ago