emr4h / CyberMachineLinks
Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given url and mail.
☆25Updated 3 years ago
Alternatives and similar repositories for CyberMachine
Users that are interested in CyberMachine are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆51Updated 2 years ago
- Awesome Cyber-Security Data-sets Collection☆20Updated 7 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆96Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆20Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23Updated last year
- A collection of Security Bookmarks☆10Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆57Updated 2 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆21Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 5 months ago
- Offensive Security Vault structure for Obsidian☆20Updated 2 years ago
- Chista | Open Threat Intelligence Framework☆59Updated last year
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
- Automating VirusTotal's API v3 for IP address and URL analysis w/HTML Reporting. Python script that functions like a CLI tool to interac…☆50Updated 3 years ago
- Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion☆24Updated last year
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Updated 5 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆198Updated 2 years ago
- blue team, red team stuff. All things cyber ;)☆78Updated 4 months ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆232Updated last year
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆31Updated 2 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆182Updated 2 years ago
- Helm chart for Open Cyber Threat Intelligence Platform☆28Updated this week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Updated 2 years ago
- ☆13Updated last year
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- Mastering AI in Cybersecurity: From Theory to Practice.☆16Updated 9 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 9 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆54Updated 2 months ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆46Updated this week