sshahriyar / totalads
Total Anomaly Detection System for software logs and traces
☆10Updated 9 years ago
Alternatives and similar repositories for totalads:
Users that are interested in totalads are comparing it to the libraries listed below
- Mine patterns from logs☆27Updated 8 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Updated 7 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Updated 10 years ago
- An open source pcap packet and NetFlow file analysis tool using Hadoop MapReduce and Hive.☆43Updated 11 years ago
- ☆15Updated 6 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Updated 9 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Updated 2 years ago
- Hogzilla is an Intrusion Detection System (IDS) supported by Snort, Apache Spark, HBase and libnDPI, which provides Network Anomaly Detec…☆28Updated 6 years ago
- Simple parser for Splunk Processing Language (SPL) written in Python.☆35Updated 6 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 7 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated last year
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 8 years ago
- Getting Started with ELK☆50Updated 9 years ago
- Opening CobaltStrike to a wider world☆8Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Collection of data sources that can be used to provide context to security events☆25Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆23Updated 5 years ago
- Python libary to normalize Yara signatures☆19Updated 4 years ago
- Using nDPI/openDPI to detect flow protocols from a PCAP file or live NIC. This program was modified from example in nDPI and I added a pe…☆23Updated 8 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- A Java library for handling TAXII Messages and invoking TAXII Services.☆20Updated 5 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Updated 9 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Updated 10 months ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago