☆52Sep 5, 2018Updated 7 years ago
Alternatives and similar repositories for training-materials
Users that are interested in training-materials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- CSV processing and web related data types mutual conversion☆17Feb 24, 2026Updated last month
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- You're busted!☆28Dec 16, 2019Updated 6 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- A Python library for parsing, manipulating, and generating MAEC content.☆42Nov 16, 2020Updated 5 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Automated handling of data feeds for security teams☆148Dec 31, 2025Updated 2 months ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆75Apr 4, 2025Updated 11 months ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- ☆29May 4, 2016Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 10 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆16Apr 30, 2024Updated last year
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,116Feb 14, 2026Updated last month
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- ☆14May 30, 2018Updated 7 years ago
- ransomware_begone☆42Mar 15, 2016Updated 10 years ago