ensarseker1 / Datasets-for-CybersecurityLinks
Sharpen your data science and cybersecurity skills by doing a project with open datasets
☆9Updated 5 years ago
Alternatives and similar repositories for Datasets-for-Cybersecurity
Users that are interested in Datasets-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- A collection of resources for security data☆41Updated 7 years ago
- Machine Learning For Cybersecurity.☆65Updated 5 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆94Updated 3 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- Awesome Cyber-Security Data-sets Collection☆20Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆32Updated 5 months ago
- Machine Learning Models to Detect and Classify Malicious URLs☆53Updated 2 years ago
- annotated dataset of cyber-security related tweets☆22Updated 4 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆25Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆46Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆92Updated last week
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆64Updated 4 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆45Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- Scans Onion sites for keywords and if found, will send an email alert to designated email address. Ideal for individuals or companies who…☆30Updated 4 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆158Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 7 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆49Updated last year
- Public datasets to help you address various cyber security problems.☆436Updated 3 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆104Updated 5 years ago
- python_dark_web☆29Updated 6 years ago
- For Public Objects☆21Updated 8 months ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- AIL project training materials☆34Updated last week
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- Technical Tabletop Exercises Simulation Framework☆47Updated last year
- Threat-Intelligence Feeds & Tools & Frameworks☆220Updated last year