ensarseker1 / Datasets-for-CybersecurityLinks
Sharpen your data science and cybersecurity skills by doing a project with open datasets
☆10Updated 5 years ago
Alternatives and similar repositories for Datasets-for-Cybersecurity
Users that are interested in Datasets-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- A collection of resources for security data☆41Updated 8 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆34Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Updated 3 years ago
- Machine Learning For Cybersecurity.☆69Updated 6 years ago
- Tools to interact with APTnotes reporting/index.☆109Updated 5 years ago
- Taranis☆64Updated 4 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Updated last year
- annotated dataset of cyber-security related tweets☆22Updated 4 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆74Updated 10 months ago
- MISP website (hugo-based)☆25Updated 3 weeks ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38Updated 8 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 6 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 months ago
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Updated 5 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Updated 3 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated 3 weeks ago
- This is an open-source repository of cybersecurity curricular modules for K-12☆49Updated last year
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 5 years ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆91Updated this week
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63Updated 8 months ago
- ☆11Updated 5 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Updated 3 weeks ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Tool used to perform threat intelligence against packet data☆36Updated last year