rieck / sallyLinks
A Tool for Embedding Strings in Vector Spaces
☆58Updated 6 years ago
Alternatives and similar repositories for sally
Users that are interested in sally are comparing it to the libraries listed below
Sorting:
- A Tool for Measuring String Similarity☆116Updated 6 years ago
- A Simple Network Stream Recorder☆35Updated 6 years ago
- A Content Anomaly Detector based on n-Grams☆23Updated 9 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Compilation of peHash implementations.☆14Updated 6 years ago
- statistical similarity of binaries (Esh)☆73Updated 8 years ago
- Meta information for the DARPA open catalog project.☆54Updated 7 years ago
- Locality-sensitive hashing algorithm for text similarity comparisons☆58Updated 2 months ago
- A project that implements statistical methods for identifying anomalous files☆22Updated 10 years ago
- implementations of a counting bloom, a timing bloom and a scaling timing bloom... made for working with streams!☆42Updated 8 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆145Updated 3 years ago
- Sequence Indexing and Search☆106Updated 2 months ago
- ☆12Updated 8 years ago
- similarity digest hashing tool☆169Updated 4 years ago
- ☆13Updated 9 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 7 years ago
- Binary analysis platform based on Octopus and Radare2☆78Updated 8 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆31Updated 8 years ago
- Programmer De-anonymization via Code Stylometry☆78Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Updated 9 years ago
- C/C++ implementation of the Smith-Waterman algorithm by using SIMD operations (e.g SSE4.1)☆23Updated 8 years ago
- ☆25Updated 9 years ago
- Java implementation of Lempel-Ziv Jaccard Distance☆21Updated 7 years ago
- Quickly analyze and explore email with advanced analytics and visualization.☆56Updated 3 years ago
- Simple clustering library for python.☆65Updated 4 years ago
- The User Activity Logging Engine, or User-ALE, is a logging mechanism used to quantitatively assess the behavioural and cognitive state o…☆13Updated 8 years ago