dtrizna / slp
Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.
☆35Updated 6 months ago
Alternatives and similar repositories for slp:
Users that are interested in slp are comparing it to the libraries listed below
- ☆21Updated 3 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆65Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆85Updated 7 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 8 months ago
- Security ML models encoded as Yara rules☆213Updated last year
- Repository of creating different example suricata data sets☆32Updated 6 years ago
- Malware Bypass Research using Reinforcement Learning☆104Updated 10 months ago
- ☆75Updated last year
- Machine Learning WAF Based☆93Updated 4 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆43Updated 4 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆22Updated 2 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆155Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- malicious PowerShell script detection model☆37Updated 3 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- SysFlow documentation and issues tracker☆46Updated 5 months ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆174Updated last year
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆51Updated last month
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆34Updated 8 months ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- ☆101Updated 4 years ago
- ☆77Updated 5 years ago
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆79Updated 3 months ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆149Updated last year
- ☆218Updated last year