Machine Learning for Computer Security
☆281Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for SecuML
Users that are interested in SecuML are comparing it to the libraries listed below
Sorting:
- Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)☆36Aug 17, 2020Updated 5 years ago
- Collaborative malware analysis framework☆381Jan 22, 2019Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Active Directory Control Paths auditing and graphing tools☆679Dec 17, 2020Updated 5 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- An analytical framework for network traffic and behavioral analytics☆456Dec 7, 2022Updated 3 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82May 18, 2018Updated 7 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Apr 14, 2025Updated 10 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- Python module to use the MISP Taxonomies☆31Feb 19, 2026Updated last week
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated 2 months ago
- Malware detection tool for Windows PE files based on DFIR ORC data☆10Updated this week
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆10Apr 10, 2024Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 8 months ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆279Mar 1, 2023Updated 3 years ago
- Trigram database written in C++, suited for malware indexing☆130Jan 26, 2026Updated last month
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 2 weeks ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated last month
- Kaspersky's GReAT KLara☆732Jul 24, 2024Updated last year
- Community modules for FAME☆65Dec 16, 2025Updated 2 months ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago