emr4h / CyberMachineLinks
Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given url and mail.
☆25Updated 3 years ago
Alternatives and similar repositories for CyberMachine
Users that are interested in CyberMachine are comparing it to the libraries listed below
Sorting:
- Awesome Cyber-Security Data-sets Collection☆20Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆50Updated 2 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆96Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 4 months ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆198Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- List of sources for cybersecurity news☆37Updated 2 years ago
- Experiments to detect phishing websites using neural networks☆22Updated 5 years ago
- Chista | Open Threat Intelligence Framework☆59Updated last year
- ☆13Updated last year
- ☆14Updated 7 years ago
- Python for cybersecurity repo☆14Updated 5 months ago
- Very basic CLI SIEM (Security Information and Event Management system).☆40Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆46Updated 2 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆20Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆20Updated 2 years ago
- A collection of Security Bookmarks☆10Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Machine Learning For Cybersecurity.☆65Updated 5 years ago
- Privilege Escalation MindMap☆15Updated 5 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- Mastering AI in Cybersecurity: From Theory to Practice.☆16Updated 8 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆95Updated last month
- Automating VirusTotal's API v3 for IP address and URL analysis w/HTML Reporting. Python script that functions like a CLI tool to interac…☆49Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- Useful resources about phishing email analysis☆85Updated 7 months ago
- This is an End-to-End Machine Learning Project which focuses on phishing websites to classify phishing and legitimate ones. Particularly,…☆29Updated 2 years ago