emr4h / CyberMachineLinks
Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given url and mail.
☆25Updated 3 years ago
Alternatives and similar repositories for CyberMachine
Users that are interested in CyberMachine are comparing it to the libraries listed below
Sorting:
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 8 months ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆53Updated 2 years ago
- Awesome Cyber-Security Data-sets Collection☆22Updated 7 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆21Updated 3 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆104Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆61Updated last year
- Website defacement attack detection with deep learning☆62Updated 11 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- Very basic CLI SIEM (Security Information and Event Management system).☆40Updated 7 years ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Updated last year
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆22Updated 2 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆28Updated 3 years ago
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆47Updated this week
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Updated last year
- Helm chart for Open Cyber Threat Intelligence Platform☆34Updated this week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆104Updated last month
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 8 months ago
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆120Updated this week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 2 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23Updated 3 years ago
- 🐠 A simple Google query builder for document file discovery☆27Updated 8 months ago
- blue team, red team stuff. All things cyber ;)☆79Updated 7 months ago
- ☆20Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 6 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆88Updated this week