carriegardner428 / cybersecurity_datascience
This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupyter Notebooks and depend on the environment described in the environment.yml file.
☆23Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for cybersecurity_datascience
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- IOC Management and Visualization Tool☆47Updated last year
- Cyber Threat Intelligence - Toolbox☆50Updated 6 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- open-source intelligence gathering for SIEMs <3☆37Updated 7 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆35Updated 9 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 2 months ago
- ☆48Updated 4 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 6 years ago
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 5 years ago
- Cyber Intel Management☆46Updated 6 years ago
- Gather and compile open source threat intelligence feeds.☆38Updated 2 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 7 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆47Updated 2 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆148Updated 6 months ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- ☆29Updated 6 years ago
- Hunting IOCs all day every day...☆83Updated last year
- Simple tool to find the yara matches on a file☆1Updated 6 years ago
- Scripts for accessing and transforming cyber threat intelligence☆25Updated 9 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆74Updated 3 months ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Cyber Threat Intelligence Feeds☆89Updated 8 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- A set of templates for documenting threat intelligence☆73Updated 11 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 7 years ago
- Python library for the ArcSight logger REST API☆27Updated 3 years ago