daniel-e / secmlLinks
Security Weaknesses in Machine Learning
☆15Updated 2 years ago
Alternatives and similar repositories for secml
Users that are interested in secml are comparing it to the libraries listed below
Sorting:
- My notes on various topics☆68Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- ☆13Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Updated 6 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- An Adaptive Misuse Detection System☆46Updated last year
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated 2 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 3 weeks ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year
- ☆25Updated 2 years ago
- ☆44Updated 6 months ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- Low budget VirusTotal Intelligence Cosplay☆20Updated 4 years ago
- Adversary Emulation Planner☆42Updated 3 weeks ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Updated 4 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 3 years ago
- Analytics for Accounting logs from Network devices☆18Updated 4 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 4 years ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Updated 11 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆107Updated this week
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 6 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago