UEBA Solution for Insider Security. This repo is archived. Thanks!
☆46Feb 28, 2020Updated 6 years ago
Alternatives and similar repositories for UBA
Users that are interested in UBA are comparing it to the libraries listed below
Sorting:
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 5 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆467Mar 1, 2026Updated last week
- A curated list of resources for Cyber Professionals☆16Dec 27, 2020Updated 5 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- AmbSQL is a DBMS that is most EASY to operate on.☆25Jul 15, 2021Updated 4 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- ☆77Feb 26, 2018Updated 8 years ago
- ☆16Feb 7, 2019Updated 7 years ago
- Python library for Myra☆10Jan 21, 2019Updated 7 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Jul 10, 2017Updated 8 years ago
- Dynatrace FM-Index library☆15Nov 11, 2025Updated 3 months ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Bugs Framework☆10Updated this week
- Basic deep learning models in PyTorch.☆10May 18, 2020Updated 5 years ago
- Action to convert a normal GitHub url to its corresponding raw url.☆11Aug 9, 2023Updated 2 years ago
- Record my learning progress.☆10Mar 1, 2022Updated 4 years ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- golang获取原始目标IP☆11Nov 18, 2019Updated 6 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- A scalable quantum network simulator based on cost vector analysis implemented in Julia.☆17May 8, 2021Updated 4 years ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆12May 6, 2023Updated 2 years ago
- YoudaoNote to WizNote,有道云笔记数据迁移为知笔记☆12Dec 4, 2018Updated 7 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- A highly secure network tunnel based on dynamic keys developed in go language☆13May 31, 2024Updated last year
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- ☆10May 6, 2023Updated 2 years ago
- dump network packet and log to database☆10Jul 24, 2022Updated 3 years ago
- Introduction and Career Guide for Data Science enthusiasts☆10Sep 16, 2018Updated 7 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- Security evaluation module with onnx, pytorch, and SecML.☆13Apr 9, 2022Updated 3 years ago
- ☆16Feb 28, 2026Updated last week
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago