Public datasets to help you address various cyber security problems.
☆465Mar 28, 2022Updated 3 years ago
Alternatives and similar repositories for Real-CyberSecurity-Datasets
Users that are interested in Real-CyberSecurity-Datasets are comparing it to the libraries listed below
Sorting:
- A curated list of amazingly awesome Cybersecurity datasets☆1,928Mar 2, 2024Updated last year
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- A python module for working with ATT&CK☆665Updated this week
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Dec 30, 2025Updated 2 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Feb 2, 2023Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆208Apr 28, 2023Updated 2 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Nov 8, 2020Updated 5 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- ☆123May 3, 2023Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆612Dec 8, 2025Updated 2 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 5 months ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆804Jan 14, 2026Updated last month
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- A configurable rule-based labeling tool for network flow files.☆18May 22, 2023Updated 2 years ago
- Dataset with labeled benign and malicious files 🗃️☆151Jul 19, 2023Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆104Nov 9, 2025Updated 3 months ago
- Machine Learning For Cybersecurity.☆69Nov 9, 2019Updated 6 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- A repository of curated datasets from various attacks☆726Updated this week
- Data and code for malware classification using machine learning (for fun, not production)☆39Mar 28, 2020Updated 5 years ago
- ☆108Jun 2, 2024Updated last year
- ☆132Jun 17, 2020Updated 5 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆638Aug 4, 2025Updated 6 months ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆15Aug 28, 2024Updated last year
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago