Hackinfinity / Cyber-Security-Dataset-collectionsLinks
Awesome Cyber-Security Data-sets Collection
☆20Updated 7 years ago
Alternatives and similar repositories for Cyber-Security-Dataset-collections
Users that are interested in Cyber-Security-Dataset-collections are comparing it to the libraries listed below
Sorting:
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- A collection of resources for security data☆41Updated 7 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 5 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆178Updated 9 months ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆99Updated 3 years ago
- Cyber Threat Intelligence Feeds☆69Updated last year
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Tools to interact with APTnotes reporting/index.☆104Updated 5 years ago
- Best practices in threat intelligence☆48Updated 2 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 2 months ago
- A curated list of awesome things related to TheHive & Cortex☆182Updated 4 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆179Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 3 weeks ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Python wrapper for urlscan.io's API☆105Updated 3 years ago
- Suricata rules for network anomaly detection☆173Updated last week
- Threat-Intelligence Feeds & Tools & Frameworks☆219Updated last year
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆63Updated last year
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆203Updated 2 years ago
- Cyber Threat Intelligence Feeds☆96Updated 9 years ago
- ☆29Updated 4 years ago
- ☆76Updated 4 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Updated 6 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆160Updated last year
- Taranis☆65Updated 4 years ago