PSJoshi / NotesLinks
My notes on various topics
☆64Updated last year
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- ☆51Updated 6 years ago
- ☆45Updated 8 years ago
- ☆27Updated 7 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- A collection of infosec related scripts and information.☆53Updated 8 months ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Botnet Simulation Framework☆78Updated 4 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- Checkpot Honeypot Checker☆43Updated 6 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 3 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆101Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago