ubc-provenance / orthrusView external linksLinks
Orthrus PIDS (USENIX Sec'25) official code
☆33Updated this week
Alternatives and similar repositories for orthrus
Users that are interested in orthrus are comparing it to the libraries listed below
Sorting:
- A framework for building provenance-based intrusion detection systems with neural networks☆71Feb 9, 2026Updated last week
- ☆32Jul 21, 2025Updated 6 months ago
- ☆123May 3, 2023Updated 2 years ago
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆17Apr 25, 2025Updated 9 months ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆91May 15, 2024Updated last year
- ☆20Oct 31, 2020Updated 5 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Aug 13, 2021Updated 4 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- The official PyTorch implementation of "An Attentional Multi-scale Co-evolving Model for Dynamic Link Prediction" (TheWebConf'23)☆11May 4, 2023Updated 2 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆14Mar 12, 2025Updated 11 months ago
- GNN模型在引文网络数据集上的代码,包括Cora、Citeseer、Pubmed、ogbn-arxiv☆10Mar 2, 2021Updated 4 years ago
- ☆11Dec 17, 2024Updated last year
- ☆11Jan 23, 2021Updated 5 years ago
- Keras Implementation of "Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering"☆11Feb 4, 2020Updated 6 years ago
- ☆11May 24, 2022Updated 3 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- ☆10Jan 21, 2022Updated 4 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Hot reload DLL on windows☆11Oct 7, 2018Updated 7 years ago
- ☆11May 3, 2019Updated 6 years ago
- code for paper RoSGAS: Adaptive Social Bot Detection with Reinforced Self-Supervised GNN Architecture Search☆11Jun 25, 2023Updated 2 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆10Aug 13, 2019Updated 6 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- ☆10Jun 23, 2022Updated 3 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 8 months ago
- Neural Network for classifying movie reviews as positive/negative using IMDB dataset☆12Feb 2, 2021Updated 5 years ago
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- ☆14Mar 2, 2023Updated 2 years ago
- Anomaly detection algorithm for social networks using Graph Neural Networks by leveraging graph parameteres, between centrality, degree, …☆12Dec 16, 2019Updated 6 years ago
- ☆13Feb 25, 2021Updated 4 years ago
- Code for the paper "Balancing Consistency and Disparity in Network Alignment"☆13Jan 18, 2022Updated 4 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- Computer Modern web fonts with public CDN☆15Mar 11, 2025Updated 11 months ago