Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.
☆64Jun 22, 2023Updated 2 years ago
Alternatives and similar repositories for ID2T
Users that are interested in ID2T are comparing it to the libraries listed below
Sorting:
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆49Jul 12, 2024Updated last year
- PathVis visualises traceroutes☆11Jan 25, 2024Updated 2 years ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Integrated MALware Simulator and Emulator☆13Dec 10, 2013Updated 12 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆54Jun 26, 2024Updated last year
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- ☆12Nov 12, 2022Updated 3 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- Dockerization of CICFlowMeter, with an entry point to accept command line parameters when running the container.☆14May 8, 2020Updated 5 years ago
- ☆20Mar 25, 2024Updated last year
- ☆75Apr 3, 2025Updated 11 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 10 months ago
- ☆70Feb 10, 2023Updated 3 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Feb 15, 2022Updated 4 years ago
- ☆19Mar 29, 2022Updated 3 years ago
- 基于ChatGPT大语言模型,通过聊天机器人自动创建vulhub的漏洞靶机环境。☆24Apr 23, 2024Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- 快速获取图片的GPS和其拍摄地理位置☆20Feb 17, 2019Updated 7 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- Sandbox samples and monitor them with kunai☆29Updated this week
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆30Aug 2, 2023Updated 2 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆70Oct 30, 2025Updated 4 months ago
- ☆31Oct 14, 2023Updated 2 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- GridAttackSim: Smart Grid Attack Simulation Framework☆27Feb 27, 2023Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago