UEBA Solution for Insider Security. This repo is archived. Thanks!
☆46Feb 28, 2020Updated 6 years ago
Alternatives and similar repositories for UBA
Users that are interested in UBA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 5 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆474Apr 12, 2026Updated last week
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- AmbSQL is a DBMS that is most EASY to operate on.☆25Apr 11, 2026Updated last week
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Springboot+Mybatis+Mysql 实现的成绩管理系统。☆10Nov 1, 2020Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 11 months ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Jul 10, 2017Updated 8 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- Exploring internet domain names with deep learning using vector embeddings☆19Dec 14, 2018Updated 7 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Phishing URL Detection with Deep Learning☆14Feb 28, 2024Updated 2 years ago
- WARNING: This repository is no longer maintained The Appsody project is no longer being maintained as a standalone project. This reposit…☆11Mar 21, 2023Updated 3 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- NLP Resources for Indian Languages☆10Nov 9, 2020Updated 5 years ago
- ☆20May 12, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Complete Python-3 programming tutorials from beginner to advanced level.☆11Jul 28, 2019Updated 6 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- 基于springboot的学生成绩管理系统☆18Jun 21, 2022Updated 3 years ago
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- Python library for Myra☆10Jan 21, 2019Updated 7 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 5 months ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- dump network packet and log to database☆10Jul 24, 2022Updated 3 years ago
- ClickHouse是一款开源的列式数据库,ClickHouse存在未授权访问漏洞,攻击者可利用该漏洞获取数据库的敏感信息☆14May 6, 2023Updated 2 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 7 months ago