Hackinfinity / Cyber-Security-Dataset-collectionsLinks
Awesome Cyber-Security Data-sets Collection
☆19Updated 6 years ago
Alternatives and similar repositories for Cyber-Security-Dataset-collections
Users that are interested in Cyber-Security-Dataset-collections are comparing it to the libraries listed below
Sorting:
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆94Updated 3 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆71Updated 5 months ago
- Cyber Threat Intelligence Feeds☆67Updated last year
- Suricata rules for network anomaly detection☆165Updated 3 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆219Updated last year
- A collection of resources for security data☆41Updated 7 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- ☆89Updated last week
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆177Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- Tools to interact with APTnotes reporting/index.☆103Updated 4 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- ☆57Updated 6 years ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆35Updated 2 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆58Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- Cyber Threat Intelligence Feeds☆97Updated 8 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆175Updated 6 months ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago