tcp pcap to weka
☆20Mar 5, 2017Updated 9 years ago
Alternatives and similar repositories for flows_to_weka
Users that are interested in flows_to_weka are comparing it to the libraries listed below
Sorting:
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Aug 30, 2020Updated 5 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- Yara sort☆13Updated this week
- Sample code for Python networking and threading☆11Oct 27, 2014Updated 11 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- Interact with the ESP8266 deauther script via discord☆11Mar 29, 2018Updated 7 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- iPython notebooks presented in rogue.ly/spy☆23Jul 26, 2014Updated 11 years ago
- Really quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and Windows📲 See https://buildapks.g…☆12Dec 24, 2019Updated 6 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Aplikasi PPOB dibuat menggunakan Xamarin.Forms, Dapat di Compile untuk Android maupun di iOS.☆14Oct 5, 2020Updated 5 years ago
- Splunking Crime using Splunk Machine Learning Toolkit☆11Dec 14, 2018Updated 7 years ago
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 8 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Fast ssdeep comparison library☆13Nov 3, 2014Updated 11 years ago
- tenjint is a Python 3-based platform for virtual machine introspection (VMI) on x86 and ARM. This is main Python 3 tenjint library.☆11Feb 9, 2021Updated 5 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- ARM/THUMB disassembler☆15Aug 9, 2010Updated 15 years ago
- Docker container to send traffic for dev/troubleshooting to another container in docker using TCPREPLAY☆15Mar 24, 2016Updated 9 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- Repo with some info about malware in IoT☆15May 31, 2018Updated 7 years ago
- Android trojan streamer client jar☆16Sep 11, 2016Updated 9 years ago
- ☆12Apr 11, 2017Updated 8 years ago
- Steam, Dota, CSGO, PUBG Scam Site☆11Jan 23, 2022Updated 4 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 2 years ago
- A simple C library for entropy measurement of byte streams and other data.☆14Dec 9, 2019Updated 6 years ago
- Bro stuff.☆12May 24, 2016Updated 9 years ago
- Postfix server container with several features☆17Apr 10, 2018Updated 7 years ago
- A whatsapp like chat application using Java.☆16Jul 22, 2018Updated 7 years ago
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- Scripts/Modulos de powershell☆15Jun 24, 2017Updated 8 years ago
- Security papers about software vulnerabilities and exploits☆14Jan 16, 2019Updated 7 years ago