ensarseker1 / AI-WorkshopLinks
Mastering AI in Cybersecurity: From Theory to Practice.
☆16Updated last year
Alternatives and similar repositories for AI-Workshop
Users that are interested in AI-Workshop are comparing it to the libraries listed below
Sorting:
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆28Updated 3 years ago
- This repo contains scripts to install a SIEM (Elasticsearch, Kibana and Filebeat) , HIDS (Wazuh Manager) and NIDS (Suricata)☆38Updated 10 months ago
- ☆133Updated 2 years ago
- Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion☆29Updated last month
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆104Updated last week
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 10 months ago
- ☆66Updated 4 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆53Updated 2 years ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆134Updated 2 weeks ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆60Updated 2 years ago
- some prompt about cyber security☆286Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Updated last year
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆54Updated last week
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆136Updated 2 years ago
- List of some cybersecurity conferences☆58Updated 4 months ago
- Useful resources about phishing email analysis☆86Updated 11 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆94Updated 2 weeks ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆118Updated 10 months ago
- ☆52Updated 4 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- ☆30Updated 2 years ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆30Updated 5 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- This is a repository for network security tools and technologies.☆101Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆32Updated last month
- Sniffing out well-known threat groups☆64Updated last year
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆29Updated 3 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆53Updated last week