emr4h / CyberMachineLinks
Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given url and mail.
☆25Updated 3 years ago
Alternatives and similar repositories for CyberMachine
Users that are interested in CyberMachine are comparing it to the libraries listed below
Sorting:
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆51Updated 2 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆20Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆60Updated last year
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- Machine Learning For Cybersecurity.☆67Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 6 months ago
- ☆15Updated 8 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆100Updated 3 years ago
- Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).☆111Updated 5 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆21Updated 3 years ago
- ☆13Updated last year
- ☆31Updated 2 years ago
- Awesome Cyber-Security Data-sets Collection☆20Updated 7 years ago
- ☆15Updated last week
- blue team, red team stuff. All things cyber ;)☆78Updated 5 months ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆201Updated 2 years ago
- Custom Black arch based docker container for continuous automated red teaming☆23Updated 4 months ago
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆78Updated 2 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
- This repository will describe the details surrounding the SIEM (wazuh) mini project, which will cover all aspects of topology design, dep…☆26Updated 2 years ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆98Updated 3 weeks ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆24Updated last year
- A collection of sources of documentation and best practices to build and run a SOC☆66Updated 2 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago
- Docker container for the gophish phishing framework.☆52Updated 3 weeks ago