emr4h / CyberMachineLinks
Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given url and mail.
☆25Updated 3 years ago
Alternatives and similar repositories for CyberMachine
Users that are interested in CyberMachine are comparing it to the libraries listed below
Sorting:
- Chista | Open Threat Intelligence Framework☆61Updated last year
- Awesome Cyber-Security Data-sets Collection☆20Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆51Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Updated last year
- blue team, red team stuff. All things cyber ;)☆78Updated 6 months ago
- This is an End-to-End Machine Learning Project which focuses on phishing websites to classify phishing and legitimate ones. Particularly,…☆32Updated 2 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23Updated 3 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- ☆13Updated last year
- Sharing our knowledge and resources in the field of cyber security.☆23Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆22Updated 2 years ago
- ☆48Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 7 months ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Updated 5 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Python for cybersecurity repo☆15Updated this week
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆21Updated 3 years ago
- Machine Learning For Cybersecurity.☆68Updated 6 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆32Updated 6 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- A collection of Security Bookmarks☆11Updated 4 years ago
- 🐠 A simple Google query builder for document file discovery☆27Updated 7 months ago
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆20Updated 5 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆102Updated 3 years ago
- ☆21Updated 8 years ago
- Cloudflare Bypass Script☆23Updated 5 years ago
- This repository contains my work done on the virtual internship provided by Australia's NSW Government on part-time job analysis of the w…☆10Updated 5 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆176Updated 2 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago