Hackinfinity / Cyber-Security-Dataset-collectionsLinks
Awesome Cyber-Security Data-sets Collection
☆20Updated 7 years ago
Alternatives and similar repositories for Cyber-Security-Dataset-collections
Users that are interested in Cyber-Security-Dataset-collections are comparing it to the libraries listed below
Sorting:
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆96Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 5 months ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Updated 7 years ago
- Cyber Threat Intelligence Feeds☆96Updated 9 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated last month
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆160Updated 11 months ago
- A collection of resources for security data☆41Updated 7 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆36Updated 3 years ago
- Open Source SIEM (Security Information and Event Management system).☆219Updated 2 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Tools to interact with APTnotes reporting/index.☆104Updated 4 years ago
- Cyber Threat Intelligence Feeds☆68Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆176Updated 9 months ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year
- Suricata rules for network anomaly detection☆170Updated 5 months ago
- Threat-Intelligence Feeds & Tools & Frameworks☆220Updated last year
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 5 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Updated 2 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated last year
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆82Updated last month
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago