alexfrancow / A-DetectorLinks
An anomaly-based intrusion detection system.
☆83Updated 2 years ago
Alternatives and similar repositories for A-Detector
Users that are interested in A-Detector are comparing it to the libraries listed below
Sorting:
- My notes on various topics☆64Updated last year
- Evading Snort Intrusion Detection System.☆78Updated 3 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- ☆45Updated 8 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- A HIDS (host-based intrusion detection system) for verifying the integrity of a system.☆59Updated last week
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- defplorex for BlackHat Arsenal☆116Updated 7 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated 2 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Detecting Lateral Movement with Machine Learning☆138Updated 7 years ago
- Checkpot Honeypot Checker☆45Updated 6 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- PhishDetect is a library to help identify phishing pages☆108Updated 2 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆153Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated 11 months ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 3 weeks ago
- ☆137Updated 6 years ago