anubhavsaxena14 / Threat-Detection-using-Sentiment-Analysis
Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.
☆11Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Threat-Detection-using-Sentiment-Analysis
- Perform file-based malware scan on your on-prem servers with AWS☆10Updated last year
- ☆11Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 8 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 2 weeks ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- Cyber Threats Detection Rules☆13Updated 2 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆13Updated this week
- ☆14Updated 6 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 5 months ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated this week
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆21Updated last year
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- A web scraper to create MISP events and reports☆14Updated last year
- ☆15Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆37Updated 3 months ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- Following repository contains source codes used in my two Books.☆10Updated 9 years ago