Hackinfinity / Cyber-Security-Dataset-collectionsLinks
Awesome Cyber-Security Data-sets Collection
☆19Updated 6 years ago
Alternatives and similar repositories for Cyber-Security-Dataset-collections
Users that are interested in Cyber-Security-Dataset-collections are comparing it to the libraries listed below
Sorting:
- A collection of resources for security data☆41Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Tools to interact with APTnotes reporting/index.☆103Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆80Updated 9 months ago
- Cyber Threat Intelligence Feeds☆96Updated 8 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 8 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆61Updated 9 months ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆34Updated last month
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆94Updated 3 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆174Updated 5 months ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆104Updated 4 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- ☆55Updated 6 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆79Updated 2 years ago