Skip to content
View zer0-1s's full-sized avatar

Block or report zer0-1s

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Kernel-level Linux security framework using eBPF/BCC and Python. Achieves 95%+ detection accuracy with minimal CPU overhead. Features cloud-integrated CLI dashboard for automated threat remediation…

Python 1 Updated Dec 17, 2025

Anomaly detection models for InfraSight. ML-based syscall frequency & resource usage profiling.

Jupyter Notebook 1 Updated Nov 22, 2025

InfraSight is a modular eBPF-based observability platform for Linux and Kubernetes environments. It provides deep visibility into system activity using custom eBPF programs, a centralized ClickHous…

35 Updated Oct 14, 2025

Integration of machine learning (ML) to eBPF-based packet filtering. Leveraging eXpress Data Path (XDP) method to incorporate ML models with floating-point weights into eBPF

C 4 2 Updated Jun 27, 2024

Machine Learning meets eBPF

C 15 2 Updated Apr 24, 2023

trans latex to docx

Python 19 4 Updated Aug 24, 2025

Optimal Transport for Function-Level and Line-Level Vulnerability Detection

Python 4 Updated Oct 8, 2025
Java 1 Updated Dec 8, 2023
Jupyter Notebook 146 37 Updated Apr 20, 2022
Python 9 1 Updated May 27, 2025

Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"

Python 133 32 Updated Oct 24, 2024
Jupyter Notebook 102 39 Updated Aug 23, 2023

The Overleaf LaTeX template of the bupt graduate thesis.

TeX 156 24 Updated Feb 9, 2026

Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggio, and Asaf Shabtai, SAC 2021.

Python 14 2 Updated Mar 22, 2021

IntelliSA: Research artifacts and replication package

Puppet 3 Updated Jan 20, 2026

KDD 2019: Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network

Python 888 221 Updated Mar 3, 2024

[VLDB'22] Anomaly Detection using Transformers, self-conditioning and adversarial training.

Python 663 190 Updated Jul 25, 2024

LogLead stands for Log Loader, Enhancer, and Anomaly Detector.

Python 29 2 Updated Sep 12, 2025

🔍Declarative LLM-powered analyzer for security events and system logs. Extracts, structures, and visualizes data for Kibana/Elasticsearch.

Python 28 8 Updated Jan 4, 2026

Context-aware network log analysis platform using LLMs to detect network security events.

Jupyter Notebook 7 Updated Oct 7, 2024

The proliferation of malicious software, particularly Java Archive (JAR) files, poses significant challenges to cybersecurity. This project leverages the REJAFADA dataset, containing an equal distr…

Jupyter Notebook 3 1 Updated Jan 29, 2025

Log Parsing with Prompt-based Few-shot Learning (ICSE 2023, Technical Track)

Jupyter Notebook 72 15 Updated Sep 10, 2025

Use PEFT or Full-parameter to CPT/SFT/DPO/GRPO 600+ LLMs (Qwen3, Qwen3-MoE, DeepSeek-R1, GLM4.5, InternLM3, Llama4, ...) and 300+ MLLMs (Qwen3-VL, Qwen3-Omni, InternVL3.5, Ovis2.5, GLM4.5v, Llava, …

Python 12,600 1,200 Updated Feb 10, 2026

Kubernetes Runtime Security Instrumentation & Enforcement

C 3 Updated Oct 8, 2023

Example BPF program with LSM hooks

C 35 4 Updated Feb 24, 2021

Secure, policy-enforced execution gateway for AI agents. agentsh sits under your agent/tooling—intercepting file, network, and process activity (including subprocess trees), enforcing the policy yo…

Go 22 1 Updated Feb 9, 2026
TypeScript 74 20 Updated Jan 9, 2026

A Low-Code MCP Framework for Building Complex and Innovative RAG Pipelines

Python 5,142 362 Updated Feb 9, 2026
Next