Hackinfinity / Cyber-Security-Dataset-collections
Awesome Cyber-Security Data-sets Collection
☆19Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cyber-Security-Dataset-collections
- A collection of resources for security data☆40Updated 6 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 6 months ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆65Updated 6 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆38Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆97Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆74Updated 3 months ago
- Tools to interact with APTnotes reporting/index.☆97Updated 4 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆69Updated 4 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆162Updated last year
- Cyber Threat Intelligence Feeds☆89Updated 8 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆38Updated 3 months ago
- Evading Snort Intrusion Detection System.☆75Updated 3 years ago
- Import Mitre Att&ck into Neo4j database☆33Updated last year
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated last month
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆98Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆60Updated 3 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆86Updated 2 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆91Updated last month
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆54Updated 5 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 8 years ago
- ☆25Updated 3 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆74Updated last month