anubhavsaxena14 / Threat-Detection-using-Sentiment-Analysis
Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.
☆11Updated 7 years ago
Alternatives and similar repositories for Threat-Detection-using-Sentiment-Analysis:
Users that are interested in Threat-Detection-using-Sentiment-Analysis are comparing it to the libraries listed below
- ☆11Updated 4 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- HoneyDB Python Module☆13Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆12Updated 7 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- ☆18Updated 6 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- Git for me to put all my forensics stuff☆21Updated 2 months ago
- ☆11Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- ☆12Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Cyber Threat Intelligence Appliance☆13Updated 2 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- ☆14Updated 5 years ago
- ☆11Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 4 years ago