anubhavsaxena14 / Threat-Detection-using-Sentiment-AnalysisLinks
Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.
☆11Updated 8 years ago
Alternatives and similar repositories for Threat-Detection-using-Sentiment-Analysis
Users that are interested in Threat-Detection-using-Sentiment-Analysis are comparing it to the libraries listed below
Sorting:
- Perform file-based malware scan on your on-prem servers with AWS☆12Updated last year
- ☆11Updated 4 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆19Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Hashes of infamous malware☆26Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- HoneyDB Python Module☆13Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- ☆12Updated 2 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- ☆18Updated 7 years ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆15Updated 2 years ago
- ☆12Updated 3 years ago
- Some YARA rules i will add from time to time☆12Updated 6 years ago