alexfrancow / A-DetectorLinks
An anomaly-based intrusion detection system.
☆85Updated 2 years ago
Alternatives and similar repositories for A-Detector
Users that are interested in A-Detector are comparing it to the libraries listed below
Sorting:
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- My notes on various topics☆67Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 2 months ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆50Updated 2 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- ☆138Updated 6 years ago
- Checkpot Honeypot Checker☆46Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 3 weeks ago
- Detecting Lateral Movement with Machine Learning☆139Updated 7 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- intrusion detection☆24Updated 8 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Malware/IOC ingestion and processing engine☆107Updated 6 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆58Updated last month
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 5 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆49Updated 4 years ago
- ☆52Updated 7 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated last year
- Distributed Network Vulnerability Scanner☆123Updated 6 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago