This repository hosts community contributed Kestrel analytics
☆18May 28, 2024Updated last year
Alternatives and similar repositories for kestrel-analytics
Users that are interested in kestrel-analytics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆19Apr 25, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- ☆20Oct 23, 2020Updated 5 years ago
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 4 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Apr 8, 2026Updated 3 weeks ago
- CP-APR Tensor Decomposition with PyTorch backend. pyCP_APR can perform non-negative Poisson Tensor Factorization on GPU, and includes an …☆19Dec 18, 2023Updated 2 years ago
- Orthrus PIDS (USENIX Sec'25) official code☆41Feb 11, 2026Updated 2 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- ☆11May 24, 2022Updated 3 years ago
- Use SQL to instantly query plugin metadata from the Steampipe Hub. Open source CLI. No DB required.☆12Apr 27, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆40Mar 18, 2022Updated 4 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆22May 22, 2023Updated 2 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆17Aug 10, 2022Updated 3 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- ☆24Mar 19, 2020Updated 6 years ago
- Docker build of GovReady☆14Nov 14, 2023Updated 2 years ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [AAAI 2026] Official implementation of "Time Series Forecasting via Direct Per-Step Probability Distribution Modeling"☆33Dec 10, 2025Updated 4 months ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆84Jun 6, 2023Updated 2 years ago
- Large scale server deploys using BitTorrent and the BitTornado library by Murder (https://github.com/lg/murder)☆30Oct 21, 2013Updated 12 years ago
- Use SQL to instantly query Prometheus metrics, alerts, labels and more. Open source CLI. No DB required.☆20Apr 12, 2026Updated 3 weeks ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- ☆11Nov 10, 2025Updated 5 months ago
- Algorithm that converts an HTML to a vectorized object suitable for neural networks.☆14Nov 2, 2020Updated 5 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Checksums for GitHub Actions.☆19Updated this week
- ☆31Updated this week
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- ☆10Jun 12, 2019Updated 6 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago
- Journal Article: International Journal of Information Technology☆14Jun 27, 2023Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year