Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based on machine learning techniques, independent of static-based signatures.
☆51Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for aktaion2
Users that are interested in aktaion2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Sep 3, 2017Updated 8 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- ☆51Aug 25, 2022Updated 3 years ago
- ☆20Nov 7, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- V1.0☆14Aug 8, 2016Updated 9 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 11 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆31Jul 9, 2025Updated 10 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated 2 years ago
- Automated detection rule analysis utility☆29Sep 22, 2022Updated 3 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆302Mar 19, 2026Updated last month
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- ☆137Mar 20, 2019Updated 7 years ago
- Philly Security Shell meetup demo and related files☆32Apr 15, 2019Updated 7 years ago
- A curated list of Awesome Threat Intelligence resources☆34Jan 12, 2018Updated 8 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- ☆26Mar 1, 2017Updated 9 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 8 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Tool allows to convert text into Morse code and save to wav file.☆15Oct 17, 2013Updated 12 years ago
- bWAPP Docker image based on raesene/bWAPP and mattrayner/lamp☆12Dec 10, 2019Updated 6 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 9 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆682Oct 28, 2023Updated 2 years ago
- JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.☆159Sep 10, 2021Updated 4 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 11 years ago