Maddy12 / SophosMachineLearningBuildingBlocksTutorialLinks
A tutorial on how to build an artificial neural network model based on URL data.
☆17Updated 7 years ago
Alternatives and similar repositories for SophosMachineLearningBuildingBlocksTutorial
Users that are interested in SophosMachineLearningBuildingBlocksTutorial are comparing it to the libraries listed below
Sorting:
- ☆154Updated 7 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆197Updated 9 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated 2 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 7 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Automated Use Case Testing☆171Updated 7 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆119Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆75Updated last year
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆92Updated 8 years ago
- PE Import Hash Generator☆79Updated 8 years ago
- Python API wrapper for the Joe Sandbox API.☆68Updated 2 weeks ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- Detecting Lateral Movement with Machine Learning☆139Updated 8 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Django web interface for managing Yara rules☆197Updated 7 years ago
- A Python library and command line tools to provide interactive log visualization.☆144Updated 3 years ago
- Automated OpenDXL Output information via IntelMQ☆14Updated 8 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 6 months ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Updated 7 months ago
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 5 years ago
- Threat Alert Logic Repository☆93Updated 6 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 6 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Updated 4 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Updated 4 years ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆182Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆396Updated 3 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Updated 4 years ago
- Malware/IOC ingestion and processing engine☆109Updated 7 years ago