Hackinfinity / Cyber-Security-Dataset-collections
Awesome Cyber-Security Data-sets Collection
☆19Updated 6 years ago
Alternatives and similar repositories for Cyber-Security-Dataset-collections:
Users that are interested in Cyber-Security-Dataset-collections are comparing it to the libraries listed below
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆34Updated 2 years ago
- A collection of resources for security data☆40Updated 7 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Import Mitre Att&ck into Neo4j database☆34Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 4 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Cyber Threat Intelligence Feeds☆93Updated 8 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- ☆29Updated 4 years ago
- ☆33Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 9 months ago
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 3 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated 9 months ago
- Cyber Threat Intelligence Feeds☆65Updated 9 months ago
- Website crawler with YARA detection☆88Updated last year