An Adaptive Misuse Detection System
☆47Nov 4, 2024Updated last year
Alternatives and similar repositories for amides
Users that are interested in amides are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Mar 12, 2026Updated last month
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- 🎤 A collection of presentation materials for my public talks.☆21Dec 17, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆60Jun 24, 2023Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆66Nov 19, 2025Updated 4 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆43Jan 10, 2025Updated last year
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆56Mar 16, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Apr 27, 2024Updated last year
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 7 months ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PoC☆12Apr 7, 2025Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- ☆19Apr 27, 2022Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆139Oct 24, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some resources to facilitate my blog on auditd for security monitoring☆13Mar 23, 2023Updated 3 years ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- ☆13Jun 26, 2022Updated 3 years ago
- Diaphora Machine Learning tools and datasets☆23Sep 23, 2024Updated last year
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- Machine Learning with Elastic Stack - Second Edition, published by Packt☆18Jun 3, 2021Updated 4 years ago