The Infosec Community Definitive Guide to Jupyter Notebooks
☆134Oct 17, 2020Updated 5 years ago
Alternatives and similar repositories for infosec-jupyter-book
Users that are interested in infosec-jupyter-book are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Building environments to replicate small networks and deploy applications☆334Jan 9, 2026Updated 4 months ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆593Jan 22, 2025Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- Open Source Security Events Metadata (OSSEM)☆1,294Feb 27, 2023Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆196May 11, 2026Updated last week
- Microsoft Threat Intelligence Security Tools☆1,969May 11, 2026Updated last week
- Interactive Azure Sentinel Notebooks provides security insights and actions to investigate anomalies and hunt for malicious behaviors.☆619Oct 17, 2025Updated 7 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆37Mar 24, 2025Updated last year
- A lab environment for learning about MSTICPy☆38Feb 3, 2023Updated 3 years ago
- Python client for DFIR-IRIS☆26Aug 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 3 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- The Hunting ELK☆3,922Jun 1, 2024Updated last year
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆572Dec 12, 2021Updated 4 years ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,692May 10, 2026Updated last week
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- Cloud Templates and scripts to deploy mordor environments☆130Mar 3, 2021Updated 5 years ago
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Misc Threat Hunting Resources☆379Jan 26, 2023Updated 3 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆814Jan 14, 2026Updated 4 months ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- MSTIC Notebook Components☆35Sep 4, 2025Updated 8 months ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆564May 6, 2025Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Nov 30, 2021Updated 4 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆426Dec 5, 2024Updated last year
- ☆16Dec 16, 2020Updated 5 years ago
- MAL-CL (Malicious Command-Line)☆325Jan 10, 2023Updated 3 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆431May 9, 2026Updated last week
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 months ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago