- BeiJing
-
23:25
(UTC -12:00) - https://www.cnblogs.com/zuoanfengxi/
Starred repositories
Open source malware detection program using machine learning algorithms on system call traces.
A machine learning toolkit for log parsing [ICSE'19, DSN'16]
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 9…
LogLLM: Log-based Anomaly Detection Using Large Language Models (system log anomaly detection)
DeepAudit:人人拥有的 AI 黑客战队,让漏洞挖掘触手可及。国内首个开源的代码漏洞挖掘多智能体系统。小白一键部署运行,自主协作审计 + 自动化沙箱 PoC 验证。支持 Ollama 私有部署 ,一键生成报告。支持中转站。让安全不再昂贵,让审计不再复杂。
The project aims to improve the intelligence level of alarm log analysis, and optimize the effect of alarm log research by using AI technology for complex alarms in network security events.
Code for the ISSRE-2024 Research Track paper: Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection
Rapidly identify and mitigate container security vulnerabilities with generative AI.
Open-source AI-augmented Security Operations Center using LLMs + Multi-Agent Orchestration | Foundation-Sec-8B | Wazuh | TheHive | RAG
SOC Analyst Level 1 Replacement using RAG LLM
Transform your documents into intelligent conversations. This open-source RAG chatbot combines semantic search with fine-tuned language models (LLaMA, Qwen2.5VL-3B) to deliver accurate, context-awa…
Malware Detection using Machine Learning with eBPF for Linux
BUPTGraduateThesis提供北京邮电大学研究生学位论文LaTeX文档类,其符合北邮研究生院2014年11月发布的《关于研究生学位论文格式的统一要求》,目前已根据2017年标准修正格式、添加英文扉页,已根据2023年标准修正格式、添加答辩小组名单页,已根据2024年标准修正格式
ICSE 2020 Artifact for: Learning from, Understanding, and Supporting DevOps Artifacts for Docker
CIS Docker Benchmark - InSpec Profile
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
A tool to scan Kubernetes cluster for risky permissions
Kubernetes Copilot powered by AI (OpenAI/Claude/Gemini/etc)
☁️ Benchmarking LLMs for Cloud Config Generation | 云场景下的大模型基准测试
Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)
[EMNLP 2024] CmdCaliper: A Semantic-Aware Command-Line Embedding Model and Dataset for Security Research
The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in real-world scenarios and enhance the generalization across dive…
A neurosymbolic framework for vulnerability detection in code
LuaN1ao (鸾鸟) is an autonomous penetration testing agent based on state awareness and causal reasoning.