Playing around with IDS data in Keras
☆13Apr 13, 2020Updated 5 years ago
Alternatives and similar repositories for DeepIDS
Users that are interested in DeepIDS are comparing it to the libraries listed below
Sorting:
- Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)☆19Jul 9, 2019Updated 6 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- Ansible roles deploying BigBlueButton☆19Aug 25, 2022Updated 3 years ago
- 原生JS版本,为墨水屏设备打造的番茄钟,开箱即用,具备记录并可视化展示历史学习时长、计划倒计时、设置时间长度、本地保存/读取等功能。☆17Apr 18, 2021Updated 4 years ago
- QubesOS dom0 automation in Python☆13Aug 3, 2017Updated 8 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆48Updated this week
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- A lightweight unified metrics library in Rust for various metrics system.☆18Nov 11, 2025Updated 4 months ago
- Implementation of the Modbus protocol in the Python programming language☆21Aug 10, 2017Updated 8 years ago
- Analysis related to article on FOIA Online Database.☆11Feb 2, 2017Updated 9 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- ☆14Apr 29, 2019Updated 6 years ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- Short introduction to Software Defined Networking☆22Aug 16, 2016Updated 9 years ago
- How to use math formulas in GitHub Markdown documents☆11May 10, 2018Updated 7 years ago
- Minimal (truly) muP implementation, consistent with TP4 and TP5 papers notation☆14Jan 2, 2026Updated 2 months ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago
- A simple and stable proxy DLL for Windows x64☆16May 31, 2021Updated 4 years ago
- ICE detention dashboard☆21Updated this week
- arm64 IOKit class dumper☆21Feb 22, 2025Updated last year
- Efficient wildcard matching against strings☆15May 21, 2024Updated last year
- ☆13Oct 27, 2020Updated 5 years ago
- Arbitrary precision integers in TensorFlow☆11Dec 27, 2022Updated 3 years ago
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing☆25Mar 4, 2026Updated 2 weeks ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- Code for Dynamic Pricing for Non-fungible Resources☆17Oct 31, 2022Updated 3 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Qubes component: core-vchan-xen☆15Feb 20, 2026Updated last month
- An experimental library for metaprogramming with algebraic effects and handlers☆28Mar 13, 2026Updated last week
- Scapy hands-on at #GreHack17☆17Nov 14, 2017Updated 8 years ago
- Optimization as a service TUI☆11Mar 11, 2024Updated 2 years ago
- ☆61Feb 12, 2026Updated last month
- ☆22Aug 11, 2021Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago