☆27Jun 25, 2021Updated 4 years ago
Alternatives and similar repositories for datasets
Users that are interested in datasets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆19Nov 22, 2022Updated 3 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 4 months ago
- ☆140Jun 17, 2020Updated 5 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- CARET - A tool for viewing cyber analytic relationships☆28Aug 21, 2020Updated 5 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆42Apr 23, 2020Updated 6 years ago
- 通过pcap文件生成描述网络传输报文的文本文件☆16Dec 22, 2017Updated 8 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Dec 28, 2020Updated 5 years ago
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 7 months ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Apr 5, 2022Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆13May 9, 2022Updated 3 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 4 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- IDA ExtraPass PlugIn☆15Jan 24, 2016Updated 10 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago
- Packer Templates☆18May 9, 2022Updated 3 years ago
- ☆28Jan 30, 2026Updated 3 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆99Aug 1, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated 2 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆142Oct 24, 2024Updated last year
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆561May 6, 2025Updated 11 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago