Search Results for "data mining in cyber security"

Showing 18 open source projects for "data mining in cyber security"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • 1
    OpenCTI

    OpenCTI

    Open Cyber Threat Intelligence Platform

    OpenCTI is a comprehensive open-source cyber threat intelligence platform designed to help organizations collect, structure, analyze, and share information about cyber threats. It provides a modern web application backed by a GraphQL API and a data model aligned with the STIX2 standard to ensure interoperability across the threat intelligence ecosystem. The platform enables teams to correlate technical indicators such as observables and TTPs with higher-level context like attribution and victimology, creating a unified intelligence knowledge base. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Pacu

    Pacu

    The AWS exploitation framework, designed for testing security

    Pacu (named after a type of Piranha in the Amazon) is a comprehensive AWS security-testing toolkit designed for offensive security practitioners. While several AWS security scanners currently serve as the proverbial “Nessus” of the cloud, Pacu is designed to be the Metasploit equivalent. Written in Python 3 with a modular architecture, Pacu has tools for every step of the pen testing process, covering the full cyber kill chain.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Open Semantic Search

    Open Semantic Search

    Open source semantic search and text analytics for large document sets

    Open Semantic Search is an open source research and analytics platform designed for searching, analyzing, and exploring large collections of documents using semantic search technologies. It provides an integrated search server combined with a document processing pipeline that supports crawling, text extraction, and automated analysis of content from many different sources. Open Semantic Search includes an ETL framework that can ingest documents, process them through analysis steps, and...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Element Android

    Element Android

    A glossy Matrix collaboration client for Android

    ...A total rewrite of Riot-Android, Element is an all-in-one secure chat app made possible through the open global Matrix network. It is a messenger that allows users to talk to anyone regardless of their app, while providing unparalleled privacy and security. It protects conversations from data-mining and ads with proper end-to-end encryption, so you can feel totally secure. Element is used by millions all over the world for their business, organizations, and even for personal and home use. It is part of the Matrix ecosystem, which is an open network for secure, decentralised communication governed by The Matrix.org Foundation.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Cut Data Warehouse Costs by 54% Icon
    Cut Data Warehouse Costs by 54%

    Easily migrate from Snowflake, Redshift, or Databricks with free tools.

    BigQuery delivers 54% lower TCO with exabyte scale and flexible pricing. Free migration tools handle the SQL translation automatically.
    Try Free
  • 5
    unMinable

    unMinable

    unMinable is a command-line based cryptocurrency mining tool

    unMinable is a command-line based cryptocurrency mining tool designed for efficient and user-friendly Bitcoin mining. It provides real-time hardware detection, mining process control, balance management, and automated withdrawal functionality. The software is designed to interact with Firebase to fetch and store user balances, withdrawals, and user-related data securely. The terminal allows users to start and monitor their mining progress, view their balances, and withdraw their mined...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Open Crypto Tracker

    Open Crypto Tracker

    Bitcoin Alts portfolio tracker, email / text / alexa / telegram alerts

    100% FREE / open source / PRIVATE cryptocurrency portfolio tracker. Email / text / alexa / telegram price alerts, price charts, mining calcs, leverage / gain / loss / balance stats, news feeds +more. Privately track Bitcoin / Ethereum / unlimited cryptocurrencies. Customize as many assets / markets / alerts / charts as you want. Over 50 Exchanges / 40 Trading Pairs Supported (exchanges / pairings list at bottom of README.txt): https://tinyurl.com/ct-readme Nearly Unlimited Assets...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    joy of text

    Editor with scripting language, security features & system interfaces.

    Jot was developed general purpose editor for large CAD files. It's command-driven UI requires no mode switching and hence requires fewer keystrokes to get a typical job done. It is particularly useful for checking and cross-referencing between several source, intermediate and output files - a common requirement for CAD work. But jot's usefulness doesn't stop there. It's sophisticated search features can, for example, be used for interactive data mining or automating the extraction of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Quiz/Survey/Test - QST

    Quiz/Survey/Test - QST

    A Free, complete, enterprise grade, open source exam management system

    QST, the worlds unparalleled open source online/lan assessment software. From a quick quiz on your phone to very large scale, high stakes, proctored desktop testing, we make it easy/secure/economical. Our intuitive design contains features (Immediate detailed results, Create/Export/Import/Convert Questions, WYSIWYG/Math-Chemistry/Basic Editors, Question/Item Bank, Multiple Question Types, Multiple Delivery Styles, Multiple Delivery/Results Options, Adaptive/Branching Questions, Randomly...
    Leader badge
    Downloads: 74 This Week
    Last Update:
    See Project
  • 9
    paramspider

    paramspider

    Mine parameterized URLs from web archives for security testing

    ParamSpider is an open source command-line tool designed to discover URLs that contain parameters by mining historical data from web archives such as the Wayback Machine. It helps security researchers, penetration testers, and bug bounty hunters collect potential attack surfaces by automatically gathering archived URLs related to a specific domain. Instead of returning every discovered URL, the tool intelligently filters results to highlight parameterized endpoints that are more useful for vulnerability testing. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • Host LLMs in Production With On-Demand GPUs Icon
    Host LLMs in Production With On-Demand GPUs

    NVIDIA L4 GPUs. 5-second cold starts. Scale to zero when idle.

    Deploy your model, get an endpoint, pay only for compute time. No GPU provisioning or infrastructure management required.
    Try Free
  • 10
    CYFS

    CYFS

    CYFS is the next-generation technology to build real Web3

    ...CYFS uses innovative technologies such as object-capability security and named data networking to offer performance, security, and offline operability. It is especially geared towards building Web3 applications and digital sovereignty ecosystems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Sandia Cyber Omni Tracker

    Sandia Cyber Omni Tracker

    Sandia Cyber Omni Tracker (SCOT)

    SCOT is an open-source cybersecurity incident response and threat intelligence management system developed by Sandia National Laboratories. It centralizes alert collection, facilitates team collaboration, and enriches data with automated analysis, enhancing the efficiency and effectiveness of security operations teams.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ReconSpider

    ReconSpider

    Most Advanced Open Source Intelligence (OSINT) Framework

    ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Addresses, Emails, Websites, and Organizations and find out information from different sources. ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters, and Cyber Crime Investigators to find deep information about their target. ReconSpider aggregate all the raw data, visualize it on a dashboard, and facilitate alerting and monitoring on the data. Recon Spider also combines the...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13
    GRASSMARLIN

    GRASSMARLIN

    Provides situational awareness of Industrial Control Systems (ICS)

    GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually display, an ICS/SCADA network topology while safely conducting device discovery, accounting, and reporting on these critical cyber-physical systems.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 14

    Algorithm Database

    Efficient Algorithms implemented in Java

    The Aim of this project is to provide a collection of reusable Algorithms which can be used effectively in different scenarios. Algorithm implementations are in Java. Objective here is to implement algorithms which should be more efficient than the JDK implementation and also to create a platform for the researchers who works on Data Mining, Encryption algorithms, ect.. to collaborate and contribute to this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    smartsbc

    Smart Session Border Controller

    SmartSBC (c) is a general purpose security framework for Session Border Controlling (SBC) keeping in mind two general considerations: a) be smart, to be a step ahead firewalling techniques and to introduce to dynamic adaptation with complex and variable threat heuristics policies. b) be pluguble, to allow more protection strategies to be available and focused on random threats. 2. Design SmartSBC (c) is a multithreaded service which contains serverla embeded and pluguble...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Web Application Protection

    Web Application Protection

    Tool to detect and correct vulnerabilities in PHP web applications

    WAP automatic detects and corrects input validation vulnerabilities in web applications written in PHP Language (version 4.0 or higher) and with a low rate of false positives. WAP detects the following vulnerabilities: - SQL injection using MySQL, PostgreSQL and DB2 DBMS - Reflected cross-site scripting (XSS) - Stored XSS - Remote file inclusion - Local file inclusion - Directory traversal - Source code disclosure - OS command injection - PHP code injection WAP is a static...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 17
    Free Windows Network User Accounting

    Free Windows Network User Accounting

    User Computer and IP Address Tracking

    FWNUA (Free Windows Network User Accounting) runs silently in a Windows login script or GPO and collects data about user logins. FWNUA keeps track of the workstations logins so you don't have to! FWNUA now supports syslog and Splunk! Look for the fwnua - syslog version in the files list. Use Splunk or your own syslog server with data mining tools to create a robust user tracking system. Find our Spunk app on Splukbase: https://splunkbase.splunk.com/app/2773/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    CyberSpy

    A cyberintelligence turn-based strategy game

    CyberSpy is a turn-based strategy game in the style of Civilization. The player takes on the role of the head of a highly secretive intelligence agency tasked with using data-mining to prevent security threats. Players must learn to balance the privacy and security of their citizens in order to succeed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB