Skip to main content

Intrusion detection based on system calls.

Project description

Detectr

https://img.shields.io/pypi/v/detectr.svg https://img.shields.io/travis/daniel-e/detectr.svg Documentation Status

Intrusion detection based on system calls.

Features

  • TODO

Credits

This package was created with Cookiecutter and the audreyr/cookiecutter-pypackage project template.

History

0.1.0 (2020-10-15)

  • First release on PyPI.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

detectr-0.0.2.tar.gz (15.1 kB view details)

Uploaded Source

Built Distribution

detectr-0.0.2-py2.py3-none-any.whl (12.5 kB view details)

Uploaded Python 2 Python 3

File details

Details for the file detectr-0.0.2.tar.gz.

File metadata

  • Download URL: detectr-0.0.2.tar.gz
  • Upload date:
  • Size: 15.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.24.0 setuptools/40.2.0 requests-toolbelt/0.9.1 tqdm/4.32.1 CPython/3.6.9

File hashes

Hashes for detectr-0.0.2.tar.gz
Algorithm Hash digest
SHA256 dfd08213529b9fd4c938fdf24ee6a6fba25049171257f45580e9c0a8c326739d
MD5 6527c70488db761fd5be0ddf48e34c69
BLAKE2b-256 5ca7ca238f257fe84e012e685e64296f9b211870471b4239cb5392affb27cc94

See more details on using hashes here.

File details

Details for the file detectr-0.0.2-py2.py3-none-any.whl.

File metadata

  • Download URL: detectr-0.0.2-py2.py3-none-any.whl
  • Upload date:
  • Size: 12.5 kB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.24.0 setuptools/40.2.0 requests-toolbelt/0.9.1 tqdm/4.32.1 CPython/3.6.9

File hashes

Hashes for detectr-0.0.2-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 49da5bf7d3a2110f8f097f6485e3d29a93a4097eed95ed457236ae1a08b22519
MD5 7fe321072952c4fdffb3c098ffd4f375
BLAKE2b-256 aedca1ce6982b87bbdba6b0a864bc6d11696ea32ae361ebb86d273b82abfc2f3

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page