gfek / Real-CyberSecurity-Datasets
Public datasets to help you address various cyber security problems.
☆357Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Real-CyberSecurity-Datasets
- A curated list of amazingly awesome Cybersecurity datasets☆1,407Updated 8 months ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆319Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆109Updated last year
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆188Updated last year
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆140Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆87Updated 4 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆47Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆137Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆229Updated 3 years ago
- A logic-based enterprise network security analyzer☆110Updated last year
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆453Updated last week
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆158Updated last year
- Cyber Attack Detection thanks to Machine Learning Algorithms☆97Updated 4 years ago
- STIX data representing MITRE ATT&CK☆346Updated last week
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆196Updated 6 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆58Updated 5 years ago
- ☆96Updated 4 years ago
- A python module for working with ATT&CK☆470Updated last week
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor …☆30Updated last year
- An awesome list of resources on deception-based security with honeypots and honeytokens☆162Updated last year
- ICS Cybersecurity PCAP respository☆49Updated 5 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆36Updated 2 months ago
- ☆73Updated last year
- AI-enabled Cybersecurity for Future Smart Environments☆19Updated 3 months ago
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- A machine learning based Intrusion Detection System☆121Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆116Updated last year
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆769Updated this week
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆300Updated last month