☆19Mar 31, 2019Updated 6 years ago
Alternatives and similar repositories for AttackAttributionDataset
Users that are interested in AttackAttributionDataset are comparing it to the libraries listed below
Sorting:
- ☆35Mar 31, 2019Updated 6 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆17Jan 29, 2019Updated 7 years ago
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Mar 11, 2017Updated 8 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- A labeled dataset used for the knowledge graph construction.☆35Nov 30, 2023Updated 2 years ago
- This plugins repository is an unofficial library of decoders for Dshell, the U.S. Army Research Lab's network forensic analysis framework…☆27Jun 20, 2016Updated 9 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 5 months ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- Real-time Packet Observation Tool☆39Sep 26, 2023Updated 2 years ago
- ☆12Sep 10, 2019Updated 6 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Activities and examples for Machine Learning with Flogo☆14Dec 5, 2025Updated 3 months ago
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- Repo for transient training paper at ICAC 2019.☆11Oct 5, 2022Updated 3 years ago
- A reddit scraping and analysis bot to visualize linguistic and content trends☆11Oct 5, 2021Updated 4 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- A WeChat (and Weixin) chatbot skeleton in Python with queue/delayed messages support.☆12Jan 12, 2026Updated last month
- ☆12Jul 7, 2014Updated 11 years ago
- view RedFlagDeals.com from the command line☆10Jul 6, 2024Updated last year
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- Machine Learning applied to Cyber Security Course☆49Sep 5, 2019Updated 6 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- flatten and expand maps of interfaces☆11Aug 26, 2025Updated 6 months ago
- A distributed system for enqueuing and processing jobs asynchronously in Go☆11Mar 7, 2018Updated 7 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Dockerfiles☆11Nov 26, 2025Updated 3 months ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Pytorch-based python library for continuous reinforcement learning and imitation learning [superseded by @osudrl/apex]☆13Mar 13, 2020Updated 5 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago