SuperCowPowers / data_hacking
Data Hacking Project
☆774Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for data_hacking
- Tool to gather Threat Intelligence indicators from publicly available sources☆655Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆536Updated last year
- Machinae Security Intelligence Collector☆504Updated 5 months ago
- ☆271Updated 6 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 7 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆933Updated 3 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆265Updated 2 years ago
- Malicious HTTP traffic explorer☆710Updated last year
- Malcom - Malware Communications Analyzer☆1,154Updated 6 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆390Updated 8 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆196Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- A modular Python application to collect intelligence for malicious hosts.☆262Updated 3 years ago
- An analytical framework for network traffic and behavioral analytics☆449Updated last year
- Machine learning driven web application firewall to detect malicious queries with high accuracy.☆422Updated 7 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆462Updated 5 years ago
- A collection of sources of indicators of compromise.☆802Updated last month
- Free Malware Training Datasets for Machine Learning☆225Updated 3 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,458Updated 4 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆130Updated 9 years ago
- A Tool for Automatic Analysis of Malware Behavior☆368Updated 5 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆276Updated last year
- ☆307Updated 7 years ago
- APTnotes data☆1,655Updated 3 months ago
- 16,432 Free Yara rules created by☆380Updated 5 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆423Updated 9 months ago
- The pattern matching swiss knife☆137Updated 4 years ago
- Super Next generation Advanced Reactive honEypot☆445Updated 5 months ago
- OpenSOC Apache Hadoop Code☆572Updated 4 years ago
- awesome security paper☆154Updated 9 years ago