Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras
☆20Apr 28, 2022Updated 4 years ago
Alternatives and similar repositories for tensorflow-insiderthreat
Users that are interested in tensorflow-insiderthreat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- ☆147Nov 17, 2020Updated 5 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 7 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- Implementation of the CTDNE algorithm.☆15Oct 28, 2018Updated 7 years ago
- Source Code for CRC Press book 'Natural Language Processing in the Real World' by Jyotika Singh☆19Jun 23, 2024Updated last year
- Implementation of algorithms proposed by [Huang and Kasiviswanathan]☆16Jul 27, 2016Updated 9 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- 云梭生产运营管理系统,作为工厂的“智能中枢”,负责精确调度与优化整个生产流程的各个环节。想象一下,一个工厂里有各种各样的机器和工人,他们需要按照一定的顺序和规则来工作,以确保生产出来的产品质量好、效率高。MOM系统就像是这个工厂的“总调度员”,它告诉机器何时开始工作、何时休…☆20Mar 8, 2026Updated 2 months ago
- ☆16Feb 7, 2023Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- An Insider Threat Toolkit☆156Dec 17, 2018Updated 7 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆14Dec 30, 2014Updated 11 years ago
- ☆15Mar 24, 2023Updated 3 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- ☆13Dec 21, 2020Updated 5 years ago
- 🎨 A simple beautiful LaTeX theme for books, thesis, note.☆23Feb 22, 2022Updated 4 years ago
- Creating a resource to help build and manage an Insider Threat program.☆102Jan 30, 2025Updated last year
- ☆16Apr 3, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 4 years ago
- A simple LaTeX class for creating a logbook to keep track of project developments.☆21Aug 18, 2022Updated 3 years ago
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆63Apr 29, 2026Updated last week
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago