PSJoshi / NotesLinks
My notes on various topics
☆64Updated last year
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- ☆27Updated 7 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆78Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- ☆45Updated 8 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- A YARA Rule Performance Measurement Tool☆59Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- ☆51Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆78Updated 7 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- For storing of the volumes☆4Updated 5 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆27Updated 4 years ago
- ☆34Updated 4 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆20Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- ☆14Updated 7 years ago