secdevopsai / Packet-Analytics
☆62Updated 6 years ago
Alternatives and similar repositories for Packet-Analytics:
Users that are interested in Packet-Analytics are comparing it to the libraries listed below
- A completely automated anomaly detector Zeek network flows files (conn.log).☆76Updated 7 months ago
- Scripts to help to detect anomalies in pcap file. Anomaly Detection using tensorflow and tshark.☆81Updated 4 years ago
- A collection of resources for security data☆41Updated 7 years ago
- ICS Cybersecurity PCAP respository☆52Updated 6 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆75Updated 7 years ago
- Zeek Training Materials/Products☆37Updated last month
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆56Updated 4 years ago
- Machine learning plugins for network traffic☆126Updated last year
- ☆21Updated 2 years ago
- zeek-scripts☆44Updated 6 years ago
- Public Repository of all Publicly Available Packet Captures that I've used or come across☆173Updated 12 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆25Updated 7 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 4 years ago
- ☆49Updated 6 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated last year
- Log4j Exploit Detection Logic for Zeek☆19Updated 10 months ago
- Docker files for building Zeek.☆86Updated last year
- Lists of products useful for ICS security☆102Updated 9 months ago
- Read and process pcap files using this nifty tool☆43Updated 6 years ago
- Mapping NSM rules to MITRE ATT&CK☆70Updated 4 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆65Updated 5 years ago
- Applied data science in cyber security☆22Updated 3 years ago
- ☆70Updated 2 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆38Updated 9 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago