WhiteHatCyberus / SNORT-GUI
SNORT GUI: Your very own trusted blueteam forensic companion for SNORT IDS.
☆19Updated 2 months ago
Related projects: ⓘ
- Pentest AI utilizes machine learning to fully automate penetration testing and exploitation for assessing port, web, and application secu…☆18Updated last month
- ☆21Updated 8 months ago
- Machine Learning For Cybersecurity.☆62Updated 4 years ago
- ☆33Updated last year
- Simple Malware Scanner written in python☆86Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆52Updated 3 months ago
- Intrusion Detection System for IoT Devices☆19Updated last year
- Machine Learning for Cyber Security☆28Updated 2 years ago
- 😈 CAUTION - Malicious files 💀☆40Updated last month
- Code repository for "Machine Learning For Red Team Hackers".☆29Updated 4 years ago
- Awesome Cyber-Security Data-sets Collection☆18Updated 6 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆76Updated 2 years ago
- A list of awesome malware detection tools☆70Updated 2 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆33Updated 5 months ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆24Updated 2 years ago
- An Intrusion Detection System written in Python☆22Updated 10 months ago
- ☆18Updated this week
- An Interface for AI built for cybersecurity professionals☆79Updated this week
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆94Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆32Updated last year
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆83Updated 5 months ago
- Deploying of infrastructure and technologies for a SOC as a Service ( SOCasS)☆10Updated 4 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆67Updated last month
- Public Code for ICS Evasion Attack Generation☆39Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 4 months ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆20Updated 2 years ago
- IoT and Operational Technology Honeypot☆104Updated 11 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆44Updated 2 years ago
- Projects that show my knowledge and experience of Cyber Security.☆14Updated 2 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆15Updated last year