Network exploit detection using highly accurate pre-trained deep neural networks with Celery + Keras + Tensorflow + Redis
☆22Dec 7, 2018Updated 7 years ago
Alternatives and similar repositories for antinex-core
Users that are interested in antinex-core are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Co…☆69Nov 2, 2018Updated 7 years ago
- Drill down into your python logs using JSON logs stored in Splunk - supports sending over TCP or the Splunk HEC REST API handlers (using …☆13Oct 18, 2022Updated 3 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Config files, inspired by https://github.com/mathiasbynens/dotfiles☆13Mar 28, 2024Updated 2 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 🕹📹 Twitch clone game/screen live streaming example built with Stream Chat and Dolby.io☆16May 26, 2020Updated 5 years ago
- Deploy a distributed AI stack to a multi-host or single-host Kubernetes cluster on CentOS 7 and also works on AWS - and comes with: cert-…☆83Mar 12, 2019Updated 7 years ago
- Apple Music Now Playing Card Animation/Transition☆16Feb 3, 2024Updated 2 years ago
- Simplest way to set default props for react-native components☆19Jan 10, 2022Updated 4 years ago
- 👩🏫📡 EdTech Virtual Classroom app with video and chat for universities, schools, students and teachers built using Stream Chat and Dol…☆21Jul 13, 2020Updated 5 years ago
- A jQuery plugin that allows you to add social buttons in a privacy friendly way☆44Oct 12, 2017Updated 8 years ago
- Tool to check DKIM-Signature of many emails and report results in a spreadsheet☆13Oct 21, 2016Updated 9 years ago
- 👩💼📡 Psychotherapy app with video and chat built using Stream Chat and Dolby.io☆23Oct 14, 2020Updated 5 years ago
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Hoping to create a somewhat complete list of all quality stuff on the Peertube federated network. I don't judge the instance where the ac…☆11Mar 11, 2021Updated 5 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- Source code of "Leaky Thoughts: Large Reasoning Models Are Not Private Thinkers" EMNLP 2025☆17Jan 12, 2026Updated 3 months ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 3 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- Network traffic data pipeline for real-time predictions and building datasets for deep neural networks☆53Sep 4, 2020Updated 5 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 9 months ago
- ☆12Dec 23, 2021Updated 4 years ago
- Yet another fork of Elijah Newren's EasyGit☆12Jul 30, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Aug 30, 2020Updated 5 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.☆29Oct 26, 2023Updated 2 years ago
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- This repository contains software for multi-agent simulation model of mixed traffic flow of connected (HVs) and automated vehicles (AVs) in …☆19May 17, 2020Updated 5 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- ☆13Aug 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CloudGraph managed policy packs☆10May 17, 2023Updated 2 years ago
- Intrusion detection engine for Cloud Systems built using Alternative Fuzzy C-mean Clustering and Artificial Neural Network☆19May 8, 2018Updated 7 years ago
- ML based intrusion detection system☆21Jun 18, 2021Updated 4 years ago
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 7 years ago
- Rails Engine to handle basic user feedback☆17Sep 25, 2025Updated 6 months ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Sep 5, 2020Updated 5 years ago
- Sample app for Build Viking.☆32Nov 19, 2020Updated 5 years ago