Hackinfinity / Cyber-Security-Dataset-collections
Awesome Cyber-Security Data-sets Collection
☆19Updated 6 years ago
Alternatives and similar repositories for Cyber-Security-Dataset-collections:
Users that are interested in Cyber-Security-Dataset-collections are comparing it to the libraries listed below
- A collection of resources for security data☆40Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 8 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Cyber Threat Intelligence Feeds☆66Updated 8 months ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- The FASTEST way to consume threat intel.☆65Updated last year
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆60Updated 5 months ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 3 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆257Updated 5 years ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆97Updated this week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆61Updated 9 months ago
- Best practices in threat intelligence☆46Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆147Updated 10 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago