Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers
☆93Oct 15, 2017Updated 8 years ago
Alternatives and similar repositories for assimilate
Users that are interested in assimilate are comparing it to the libraries listed below
Sorting:
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆196Oct 24, 2016Updated 9 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- ☆154Dec 6, 2018Updated 7 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Jul 19, 2021Updated 4 years ago
- My collection of scripts for Ghidra (https://github.com/NationalSecurityAgency/ghidra)☆10Sep 13, 2020Updated 5 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Dec 24, 2020Updated 5 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- Open Development projects for TekDefense☆78Oct 5, 2016Updated 9 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 5 years ago
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- Vagrantfile and scripts for building a disposable OpenSOC Cluster☆29Nov 5, 2016Updated 9 years ago
- Powershell Threat Hunting Module☆290Sep 21, 2016Updated 9 years ago
- ☆25Aug 14, 2015Updated 10 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Data Hacking Project☆783Mar 5, 2019Updated 7 years ago
- ☆28Nov 20, 2025Updated 4 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 3 years ago
- Bro scripts written by CrowdStrike Services☆150May 3, 2021Updated 4 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆938Dec 12, 2023Updated 2 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,859Nov 17, 2021Updated 4 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Jul 5, 2018Updated 7 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago