SuperCowPowers / data_hacking
Data Hacking Project
☆777Updated 6 years ago
Alternatives and similar repositories for data_hacking:
Users that are interested in data_hacking are comparing it to the libraries listed below
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Updated 6 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆269Updated 2 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆940Updated 3 years ago
- Malicious HTTP traffic explorer☆717Updated 2 years ago
- ☆269Updated 6 years ago
- Machinae Security Intelligence Collector☆508Updated 10 months ago
- An analytical framework for network traffic and behavioral analytics☆450Updated 2 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated last year
- ☆307Updated 7 years ago
- Malcom - Malware Communications Analyzer☆1,158Updated 7 years ago
- Threat Intelligence APIs☆277Updated last year
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,483Updated 4 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆197Updated 8 years ago
- Created by Jin Qian via the GitHub Connector☆432Updated last year
- Incident Response Forensic Framework☆599Updated 5 years ago
- Alienvault Labs Projects Random Stuff☆520Updated 3 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆369Updated 10 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆471Updated 2 months ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- CRITs - Collaborative Research Into Threats☆900Updated 5 years ago
- A Tool for Automatic Analysis of Malware Behavior☆369Updated 5 years ago
- Binary analysis and management framework☆1,542Updated last year
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- ☆708Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆434Updated 2 years ago
- Super Next generation Advanced Reactive honEypot☆461Updated 9 months ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 7 years ago
- ☆293Updated last year