Hackinfinity / Cyber-Security-Dataset-collectionsLinks
Awesome Cyber-Security Data-sets Collection
β20Updated 7 years ago
Alternatives and similar repositories for Cyber-Security-Dataset-collections
Users that are interested in Cyber-Security-Dataset-collections are comparing it to the libraries listed below
Sorting:
- 𧬠Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)β102Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of theβ¦β63Updated 3 years ago
- Cyber Threat Intelligence Feedsβ69Updated last year
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detβ¦β171Updated 2 years ago
- A collection of resources for security dataβ41Updated 7 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokensβ177Updated 10 months ago
- Suricata rules for network anomaly detectionβ177Updated 3 weeks ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout forβ¦β37Updated 3 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linuxβ86Updated last month
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDSβ160Updated last year
- Open Source SIEM (Security Information and Event Management system).β220Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactivelyβ38Updated 6 months ago
- Tools to interact with APTnotes reporting/index.β106Updated 5 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yoβ¦β41Updated 8 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feedβ39Updated last year
- Cyber Threat Intelligence - Toolboxβ51Updated 7 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ranβ¦β72Updated 2 years ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accouβ¦β112Updated last year
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.β68Updated 7 months ago
- Submits multiple domains to VirusTotal APIβ59Updated 4 years ago
- Collection of Suricata rule sets that I use modified to my environments.β40Updated 5 years ago
- β52Updated this week
- CARET - A tool for viewing cyber analytic relationshipsβ55Updated 5 years ago
- Python wrapper for urlscan.io's APIβ105Updated 4 years ago
- Tool used to perform threat intelligence against packet dataβ36Updated 9 months ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscanβ29Updated 2 weeks ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.β158Updated 7 months ago
- A completely automated anomaly detector Zeek network flows files (conn.log).β82Updated 3 months ago
- β92Updated last week
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.β20Updated 2 years ago