A community event for security researchers to share their favorite notebooks
☆108Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for infosec-jupyterthon
Users that are interested in infosec-jupyterthon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Infosec Community Definitive Guide to Jupyter Notebooks☆133Oct 17, 2020Updated 5 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆143Oct 12, 2020Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆808Jan 14, 2026Updated 2 months ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆324Jan 10, 2023Updated 3 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆194Dec 16, 2025Updated 3 months ago
- Microsoft Threat Intelligence Security Tools☆1,955Mar 25, 2026Updated 2 weeks ago
- MSTIC Notebook Components☆35Sep 4, 2025Updated 7 months ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆572Dec 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Dec 3, 2022Updated 3 years ago
- Re-play Security Events☆1,732Mar 20, 2024Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆331Jan 9, 2026Updated 3 months ago
- Actionable analytics designed to combat threats☆1,007May 25, 2022Updated 3 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 4 years ago
- Go implementation of the Community ID flow hashing standard☆22Apr 17, 2025Updated 11 months ago
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆588Jan 22, 2025Updated last year
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated 3 weeks ago
- Windows Events Attack Samples☆2,541Jan 24, 2023Updated 3 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 2 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Jun 6, 2024Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,069Oct 5, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Understand adversary tradecraft and improve detection strategies☆713Mar 9, 2023Updated 3 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,858Nov 17, 2021Updated 4 years ago
- Meeting notes☆14Apr 5, 2016Updated 10 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,461Mar 28, 2026Updated last week
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago