Advanced Persistent Threat Detection Using Network Analysis
☆23Feb 28, 2019Updated 7 years ago
Alternatives and similar repositories for aptdetector
Users that are interested in aptdetector are comparing it to the libraries listed below
Sorting:
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- ☆17Jan 22, 2026Updated last month
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- ☆21May 19, 2016Updated 9 years ago
- Tiny Go implementation of Couchbase Bucket API, for testing☆28Sep 21, 2023Updated 2 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Aug 21, 2020Updated 5 years ago
- We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar.…☆24Jan 28, 2020Updated 6 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 6 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- Main repository for the Logchain as a Service platform☆11Dec 8, 2022Updated 3 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Sep 26, 2024Updated last year
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Aug 30, 2020Updated 5 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Advanced threat detection solution for Linux.☆36Dec 5, 2020Updated 5 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆168Dec 10, 2018Updated 7 years ago
- Scripts for better management of Odoo☆12Sep 20, 2016Updated 9 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Getting started guides to deploy the SIGHUP Distribution (SD) in different environments☆15Updated this week
- A WeChat (and Weixin) chatbot skeleton in Python with queue/delayed messages support.☆12Jan 12, 2026Updated last month
- Newsletter box plugin for wordpress☆10Mar 21, 2016Updated 9 years ago
- Alternative password shadowing scheme☆10Feb 16, 2026Updated last week
- Go automated nmap scanner☆12Jun 17, 2019Updated 6 years ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- Code used in analysis and visualisation of IUCN threat maps☆15Aug 26, 2021Updated 4 years ago
- A Deluge script that pulls records from CRM/ other database into a Creator Form as Subform Rows, and then push any changes to each indivi…☆11Apr 24, 2024Updated last year