A preprocessor module for Snort that uses ML algorithms for pruning, clustering and finding correlation between alerts
☆32Jun 27, 2019Updated 6 years ago
Alternatives and similar repositories for Snort_AIPreproc
Users that are interested in Snort_AIPreproc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- ☆16May 16, 2022Updated 3 years ago
- Snort rule parser/validator written in python.☆19May 16, 2023Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- ☆12Dec 6, 2024Updated last year
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- A very simple Shopify Bot to self checkout using Python and Selenium.☆15Jun 11, 2020Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- GridAttackSim: Smart Grid Attack Simulation Framework☆27Feb 27, 2023Updated 3 years ago
- Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039☆47Dec 15, 2025Updated 3 months ago
- Dockerization of CICFlowMeter, with an entry point to accept command line parameters when running the container.☆14May 8, 2020Updated 5 years ago
- ☆23Mar 11, 2022Updated 4 years ago
- Writeups of CTFLearn Challenges , by EdbR - EladBeber☆15Feb 21, 2026Updated last month
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago
- I share the solutions and scripts of the questions I like in the CTF I enter.☆18Feb 16, 2024Updated 2 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- ☆25Dec 4, 2020Updated 5 years ago
- Code snippet accompanying blog post☆29Oct 14, 2015Updated 10 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- C++ solution for the chinese postman problem☆29Jul 7, 2021Updated 4 years ago
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- A complete women's safety app with various advanced features such as emergency SOS ,Software simulation of electromagnetic waves detectio…☆31Nov 19, 2021Updated 4 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- ☆12Jun 8, 2021Updated 4 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago