raaj2493 / Basic_expensetracker_providerLinks
β11Updated 8 months ago
Alternatives and similar repositories for Basic_expensetracker_provider
Users that are interested in Basic_expensetracker_provider are comparing it to the libraries listed below
Sorting:
- π URL Shortener API A fast and secure URL shortener built with Node.js, Express, Drizzle ORM, and PostgreSQL. Features JWT authenticatiβ¦β16Updated 4 months ago
- β52Updated 6 months ago
- Cyber Analytics Repositoryβ978Updated 8 months ago
- Splunk Security Contentβ1,568Updated this week
- STIX data representing MITRE ATT&CKβ525Updated last month
- A python module for working with ATT&CKβ657Updated last week
- Cortex: a Powerful Observable Analysis and Active Response Engineβ1,545Updated 2 months ago
- β21Updated 5 months ago
- SolarSystemβ13Updated last year
- β11Updated last year
- Open Source Security Events Metadata (OSSEM)β1,287Updated 2 years ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.β934Updated last year
- Re-play Security Eventsβ1,723Updated last year
- Configuration files for the SOF-ELK VMβ1,715Updated 3 weeks ago
- Phantom Community Playbooksβ528Updated 3 weeks ago
- This is a Malware Detection ML model made using Random Forest Algorithmβ39Updated last year
- A repository of curated datasets from various attacksβ726Updated last week
- MITRE ATT&CK Websiteβ568Updated this week
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.β1,115Updated last week
- Machine learning based Intrusion detection system (IDS)β65Updated 4 years ago
- Actionable analytics designed to combat threatsβ1,006Updated 3 years ago
- Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machineβ¦β54Updated 3 months ago
- Ransomware Detection using Machine Learning Models and Ensemble Techniqueβ35Updated last year
- OASIS TC Open Repository: Python APIs for STIX 2β414Updated this week
- A collection of resources for Threat Huntersβ914Updated last year
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.β¦β29Updated 10 years ago
- OpenCTI Connectorsβ514Updated last week
- Extract and aggregate threat intelligence.β902Updated 2 years ago
- Generative Adversarial Network to generate malware to evade detectionβ15Updated 2 years ago
- ReversingLabs YARA Rulesβ892Updated 3 months ago