kaiiyer / UBAView external linksLinks
UEBA Solution for Insider Security. This repo is archived. Thanks!
☆46Feb 28, 2020Updated 5 years ago
Alternatives and similar repositories for UBA
Users that are interested in UBA are comparing it to the libraries listed below
Sorting:
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 2 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆465Apr 25, 2024Updated last year
- A curated list of resources for Cyber Professionals☆16Dec 27, 2020Updated 5 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 9 months ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Springboot+Mybatis+Mysql 实现的成绩管理系统。☆10Nov 1, 2020Updated 5 years ago
- ☆77Feb 26, 2018Updated 7 years ago
- Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.☆40Feb 25, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 3 weeks ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆14Feb 19, 2021Updated 4 years ago
- WARNING: This repository is no longer maintained The Appsody project is no longer being maintained as a standalone project. This reposit…☆11Mar 21, 2023Updated 2 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- golang获取原始目标IP☆11Nov 18, 2019Updated 6 years ago
- ☆12Jan 17, 2026Updated 3 weeks ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Record my learning progress.☆10Mar 1, 2022Updated 3 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- ☆10May 6, 2023Updated 2 years ago
- Complete Python-3 programming tutorials from beginner to advanced level.☆11Jul 28, 2019Updated 6 years ago
- In this repository, I have used ARIMA,SARIMA,AutoArima,ANN,CNN and LSTMs for time series modelling and Anomaly detection has been done us…☆12Feb 8, 2021Updated 5 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- ☆16Updated this week
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated last year
- 工业级中文语音识别系统电子书☆13Oct 30, 2020Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆12May 6, 2023Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆19Aug 31, 2025Updated 5 months ago
- dump network packet and log to database☆10Jul 24, 2022Updated 3 years ago
- ☆11Mar 7, 2021Updated 4 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- ☆13Nov 28, 2019Updated 6 years ago