Created Network Intrusion Detection System using Pytorch
☆15Oct 15, 2020Updated 5 years ago
Alternatives and similar repositories for IDS
Users that are interested in IDS are comparing it to the libraries listed below
Sorting:
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- This version of VLC is suitable with ns3 version 3.25. Please dont use an older version than the specified one.☆10Apr 3, 2017Updated 8 years ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 12 years ago
- ☆15Feb 27, 2019Updated 7 years ago
- PQCrypto is a go post quantum cryptography (PQC) algorithms lib for studying the pqc migration and application adaptation.☆15Nov 14, 2022Updated 3 years ago
- Multi-Modal Imitation Learning in Partially Observable Environments☆13Sep 5, 2020Updated 5 years ago
- Implementation of methodology described in ACM SIGCOMM CCR 48(1), pp. 19-27.☆14May 15, 2018Updated 7 years ago
- This repository demonstrates a security vulnerability in MCP (Model Context Protocol ) servers that allows for remote code execution and …☆21Apr 21, 2025Updated 10 months ago
- ☆15Jan 24, 2023Updated 3 years ago
- A server for shipping channel state information obtained using the Atheros CSI Tool via UDP in real time.☆13Dec 30, 2021Updated 4 years ago
- ☆21Mar 27, 2025Updated 11 months ago
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Sep 20, 2023Updated 2 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- ☆16Feb 9, 2021Updated 5 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 9 years ago
- Unet user contributions☆13Aug 6, 2025Updated 7 months ago
- Isolation Forest☆13Mar 30, 2018Updated 7 years ago
- Explore CSI samples in pcap files☆11Mar 10, 2021Updated 4 years ago
- 基于图挖掘的网络异常检测系统的研究与实现☆11Sep 24, 2018Updated 7 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- Working examples of KRSI (via BCC scripts).☆15Dec 21, 2020Updated 5 years ago
- ☆13Jun 12, 2024Updated last year
- ROSE-T: ROuting SEcurity Tool☆17Nov 9, 2024Updated last year
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆19Jan 7, 2026Updated last month
- Initial commit☆15Dec 2, 2015Updated 10 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 11, 2020Updated 6 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 5 years ago
- A dataset for natural language code search.☆14Feb 13, 2020Updated 6 years ago
- Jointly learning policies and latent representations for driver behavior.☆15Jun 6, 2017Updated 8 years ago
- An example of iptables-bpf with Go+eBPF☆17Dec 16, 2021Updated 4 years ago
- ☆15Mar 25, 2018Updated 7 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆15Jan 16, 2023Updated 3 years ago
- Registerium☆15Jul 4, 2018Updated 7 years ago
- A learning-guided approach for executing arbitrary Python code snippets☆16Mar 4, 2024Updated 2 years ago
- ☆20May 21, 2014Updated 11 years ago
- Javascript implementation for COALA IP☆19Sep 25, 2018Updated 7 years ago
- ☆22Feb 18, 2026Updated 2 weeks ago
- Turn Ducky Scripts into QMK ready SEND_STRING() macros☆19Nov 14, 2019Updated 6 years ago