Maddy12 / SophosMachineLearningBuildingBlocksTutorialLinks
A tutorial on how to build an artificial neural network model based on URL data.
☆17Updated 7 years ago
Alternatives and similar repositories for SophosMachineLearningBuildingBlocksTutorial
Users that are interested in SophosMachineLearningBuildingBlocksTutorial are comparing it to the libraries listed below
Sorting:
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆91Updated 8 years ago
- Automated OpenDXL Output information via IntelMQ☆14Updated 8 years ago
- ☆152Updated 6 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆74Updated last year
- ☆34Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 4 years ago
- Django web interface for managing Yara rules☆195Updated 7 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 2 months ago
- Set of Yara rules for finding files using magics headers☆140Updated 5 years ago
- Python module to interact with the MITRE attack framework via the MITRE API☆85Updated 7 years ago
- PE Import Hash Generator☆79Updated 8 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆197Updated 8 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 4 years ago
- Automated Use Case Testing☆169Updated 7 years ago
- Library of functions to apply Data Science in several forensics artifacts☆40Updated last year
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 4 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆87Updated 3 years ago
- Detecting Lateral Movement with Machine Learning☆138Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆159Updated 3 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Parse YARA rules and operate over them more easily.☆192Updated 8 months ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 6 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago