This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupyter Notebooks and depend on the environment described in the environment.yml file.
☆26Oct 28, 2017Updated 8 years ago
Alternatives and similar repositories for cybersecurity_datascience
Users that are interested in cybersecurity_datascience are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vision Transformer GAN Architecture☆12May 19, 2021Updated 4 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- ☆75Mar 24, 2021Updated 5 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- ☆24Mar 29, 2020Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 6 months ago
- ☆10May 6, 2017Updated 8 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- ☆13May 17, 2016Updated 9 years ago
- Tool (CLI) for using haveibeenpwned through its API (only passwords for now)☆11Apr 26, 2018Updated 7 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- WhoDAT is an InfoSec Analyzer for Nerds using VirusTotal, Google Safe Browsing, URLScan, Hybrid-Analysis, and OpenAI. Scan URLs, emails, …☆13Jan 4, 2026Updated 2 months ago
- NetCommander - An easy to use arp spoofing tool.☆19Jul 6, 2011Updated 14 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Educational repository with source code examples☆12Jun 3, 2025Updated 9 months ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- Discover "HotSpots" - potential spots for credentials theft☆24Apr 12, 2018Updated 7 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Aug 31, 2016Updated 9 years ago
- Packet capture libraries benchmark☆35Jan 31, 2021Updated 5 years ago
- small IR scripts for orgs using G Suite☆18Feb 27, 2019Updated 7 years ago
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆14Oct 18, 2024Updated last year
- ☆14Feb 7, 2018Updated 8 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- Easy links and guides for DEF CON 28 and 29☆57Aug 5, 2021Updated 4 years ago
- Queries a McAfee ESM for inactive data sources.☆10Dec 16, 2019Updated 6 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 7 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- AIShub collector gets data from AIShub network and stores it to the MySQL database for later use.☆12Feb 23, 2018Updated 8 years ago
- Developer documentation for Resilient APIs☆25Jan 6, 2025Updated last year
- Scripts, SQL queries, and other resources for Nexpose☆30Mar 3, 2025Updated last year
- ☆17May 7, 2019Updated 6 years ago