cayenneZ / AI-Cyber-Security
☆37Updated 6 years ago
Alternatives and similar repositories for AI-Cyber-Security:
Users that are interested in AI-Cyber-Security are comparing it to the libraries listed below
- A collection of resources for security data☆40Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Malware Data Science Reading Diary / Notes☆122Updated 5 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆133Updated 4 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- A python script that a) parses NIST NVD CVEs, b) prcoesses and exports them to CSV files, c) creates a postgres database and imports all …☆76Updated 3 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆151Updated 6 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆143Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- A list of cybersecurity projects that use machine learning techniques☆57Updated 8 years ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- Collection of cyber security and "AI" relevant topics☆74Updated 7 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 5 years ago
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- My notes on various topics☆64Updated last year
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- A Python package to interact with the Mitre ATT&CK Framework☆472Updated last year
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- Automated Use Case Testing☆165Updated 6 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆149Updated 8 months ago
- Cyber Threat Intelligence - Toolbox☆50Updated 6 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆46Updated 8 years ago
- CASCADE Server☆265Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆257Updated 5 years ago