A community event for security researchers to share their favorite notebooks
☆108Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for infosec-jupyterthon
Users that are interested in infosec-jupyterthon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Infosec Community Definitive Guide to Jupyter Notebooks☆133Oct 17, 2020Updated 5 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Oct 12, 2020Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆811Jan 14, 2026Updated 3 months ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆324Jan 10, 2023Updated 3 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆195Dec 16, 2025Updated 4 months ago
- Microsoft Threat Intelligence Security Tools☆1,964Updated this week
- MSTIC Notebook Components☆35Sep 4, 2025Updated 7 months ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆14Dec 3, 2022Updated 3 years ago
- Re-play Security Events☆1,743Mar 20, 2024Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆333Jan 9, 2026Updated 3 months ago
- Actionable analytics designed to combat threats☆1,007May 25, 2022Updated 3 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 4 years ago
- Go implementation of the Community ID flow hashing standard☆22Apr 17, 2025Updated last year
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆592Jan 22, 2025Updated last year
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Open Source Security Events Metadata (OSSEM)☆1,292Feb 27, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Windows Events Attack Samples☆2,555Jan 24, 2023Updated 3 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆89Mar 11, 2026Updated last month
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Apr 15, 2026Updated 2 weeks ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,070Oct 5, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Understand adversary tradecraft and improve detection strategies☆715Mar 9, 2023Updated 3 years ago
- Meeting notes☆14Apr 5, 2016Updated 10 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,863Nov 17, 2021Updated 4 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 3 years ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,478Updated this week
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago