carriegardner428 / cybersecurity_datascienceLinks
This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupyter Notebooks and depend on the environment described in the environment.yml file.
☆24Updated 7 years ago
Alternatives and similar repositories for cybersecurity_datascience
Users that are interested in cybersecurity_datascience are comparing it to the libraries listed below
Sorting:
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Searches for Insider Threat Hunting☆32Updated 6 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- For storing of the volumes☆4Updated 5 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- ☆55Updated 3 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Security Onion Splunk App☆10Updated 10 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- ☆29Updated 4 years ago
- ☆19Updated 3 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆54Updated 7 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆151Updated last year
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆38Updated 9 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- ☆49Updated 4 years ago