Open safety platform. Event tracking, threat detection, and risk management for any product.
-
Updated
Dec 1, 2025 - PHP
Open safety platform. Event tracking, threat detection, and risk management for any product.
Cloud Security Operations Orchestrator
vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization, for teams to make more informed decision about what (vulnerability/ties) they should remediate (or can afford not to) and on which (asset/s)
Security Analytics Engine - Anomaly Detection in Web Traffic
Detection of network traffic anomalies using unsupervised machine learning
Digital Twin Driven Security Analytics for the Industrial Internet of Things.
Plug into extended SecOps: Bring Google Cloud's analytics to your local network. tshark captures on-prem, GCP transforms to UDM. Scalable, event-driven, via Terraform.
This repository contains an end-to-end walkthrough to leverage Google Cloud services to demonstrate Solution Accelerators for few business domains
Production-ready authentication framework that saves you weeks of development. Features enterprise-grade security: 2FA/TOTP, LDAP integration, intelligent rate limiting, session fingerprinting, brute-force protection, security analytics dashboard, comprehensive audit logging, and granular role-based access control.
Splunk project analyzing simulated Linux syslog data to detect brute-force login attempts, error rate anomalies, escalated warnings, and correlated security events. Demonstrates advanced SPL, time-window correlation, lookup-based classification, and real-world SOC/SRE insights through storytelling dashboards.
Python tool for turning noisy system logs into actionable security intelligence.
Research SOC testbed for alert correlation and noise reduction. Zeek + Wazuh + Elastic. Includes generated attack telemetry, detections, metrics, and reproducible experiments
🛡️ CyberSentinel – Threat Intel + Log Correlation Dashboard. An analyst-grade security tool that ingests threat intelligence, parses SSH/Apache logs, correlates IOCs, and generates real-time alerts.
🔐 Malware Detection System using classical ML models to classify and detect malicious software based on behavior and feature patterns.
Offline-first, budget-aware log+CTI pipeline with optional LLM enrichment; grouping/sampling gates, strong CTI cache, reproducible reports, Streamlit UI.
The 'CyberGuard' delivers a modular, multi-layer security system for modern web applications. It bundles client-side anomaly detection, DDoS-Guard, DOM protection, input shielding, service-worker hardening and UI blackout controls into one compact package.
This project demonstrates SSH authentication log analysis using Splunk SIEM to detect malicious activity such as brute-force attacks, unauthorized access attempts, and suspicious SSH behavior. It simulates real-world SOC analyst workflows, including log ingestion, SPL queries, dashboards, and alerting.
ML-based Intrusion Detection System using NSL-KDD. Includes preprocessing, feature engineering, Random Forest model (AUC 0.96), ROC curve, FastAPI prediction API, and a real-time intrusion analysis dashboard.
A reproducible lab demonstrating ingest, parsing, detection, and dashboards for pfSense firewall logs and Ubuntu host telemetry using Splunk SIEM monitoring of Kali exploit methods.
Add a description, image, and links to the security-analytics topic page so that developers can more easily learn about it.
To associate your repository with the security-analytics topic, visit your repo's landing page and select "manage topics."