A community event for security researchers to share their favorite notebooks
☆108Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for infosec-jupyterthon
Users that are interested in infosec-jupyterthon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Infosec Community Definitive Guide to Jupyter Notebooks☆134Oct 17, 2020Updated 5 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Oct 12, 2020Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆70Dec 2, 2022Updated 3 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆814Jan 14, 2026Updated 4 months ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆325Jan 10, 2023Updated 3 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆196May 11, 2026Updated last week
- Microsoft Threat Intelligence Security Tools☆1,969May 11, 2026Updated last week
- MSTIC Notebook Components☆35Sep 4, 2025Updated 8 months ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆572Dec 12, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Dec 3, 2022Updated 3 years ago
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆334Jan 9, 2026Updated 4 months ago
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 4 years ago
- Go implementation of the Community ID flow hashing standard☆22Apr 17, 2025Updated last year
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆593Jan 22, 2025Updated last year
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Open Source Security Events Metadata (OSSEM)☆1,294Feb 27, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Windows Events Attack Samples☆2,560Jan 24, 2023Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆89Mar 11, 2026Updated 2 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108May 11, 2026Updated last week
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,071Oct 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Understand adversary tradecraft and improve detection strategies☆715Mar 9, 2023Updated 3 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,867Nov 17, 2021Updated 4 years ago
- Meeting notes☆14Apr 5, 2016Updated 10 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 3 years ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 6 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,489May 9, 2026Updated last week
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago