emr4h / CyberMachine
Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given url and mail.
☆25Updated 2 years ago
Alternatives and similar repositories for CyberMachine:
Users that are interested in CyberMachine are comparing it to the libraries listed below
- Chista | Open Threat Intelligence Framework☆58Updated 11 months ago
- ☆13Updated 10 months ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Updated 10 months ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Updated 4 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated 11 months ago
- Open Source Cyber Threat Intelligence Feed Collector☆16Updated 3 years ago
- Includes voluntary work on all abuses related to earthquakes.☆23Updated 2 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 2 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 10 months ago
- ☆9Updated 3 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆39Updated 7 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆25Updated 4 years ago
- Useful resources about phishing email analysis☆82Updated 2 months ago
- Tools and resources to help you build, design, and win hackathons! 🏆☆48Updated this week
- Hacker Warz is a text-based hacking simulation game inspired by the retro game "Drug Wars" that was played on graphing calculators back i…☆1Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆44Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆22Updated 2 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆22Updated 3 years ago
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆17Updated 2 years ago
- ☆13Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- Privilege Escalation MindMap☆15Updated 4 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆17Updated 2 years ago
- this repo is for red team process and tools collection☆23Updated 3 years ago
- ☆47Updated 2 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆19Updated this week
- Türkçe Sahte Kişi/Kimlik/İsim Oluşturucu☆12Updated 4 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- Multi-Lingual GenAI Red Teaming Tool☆24Updated 8 months ago