dtrizna / slpLinks
Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.
☆36Updated 11 months ago
Alternatives and similar repositories for slp
Users that are interested in slp are comparing it to the libraries listed below
Sorting:
- User and Entity Behavior Analytics by deep learning☆113Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆157Updated 3 years ago
- ☆25Updated 4 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆19Updated 2 weeks ago
- A logic-based enterprise network security analyzer☆126Updated 2 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆24Updated 2 years ago
- ☆79Updated 5 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆96Updated last year
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆39Updated 3 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆16Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆157Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- ☆35Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆70Updated 4 years ago
- ☆79Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- malicious PowerShell script detection model☆40Updated 3 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆27Updated last year
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆127Updated 2 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆73Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆50Updated 4 years ago
- ☆116Updated 5 years ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago