Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based on machine learning techniques, independent of static-based signatures.
☆51Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for aktaion2
Users that are interested in aktaion2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 7 years ago
- ☆14Sep 3, 2017Updated 8 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆24Jul 30, 2025Updated 8 months ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 11 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated 2 years ago
- Automated detection rule analysis utility☆29Sep 22, 2022Updated 3 years ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆302Mar 19, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Philly Security Shell meetup demo and related files☆32Apr 15, 2019Updated 7 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆34Jan 12, 2018Updated 8 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- Tool allows to convert text into Morse code and save to wav file.☆15Oct 17, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Recognizes your speech in mp3 audio file, wav file or laptop microphone and converts to text☆10Nov 18, 2019Updated 6 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 9 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.☆158Sep 10, 2021Updated 4 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- It is a program which converts wav file to srt file and translates text language.☆13Jun 20, 2024Updated last year
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Ingest CSV processor parses CSV data and stores it as individual fields☆35Feb 17, 2020Updated 6 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- A Chef Cookbook to install and configure osquery.☆15Oct 19, 2022Updated 3 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago