gubertoli / ProbingDataset
Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan
☆29Updated 3 months ago
Alternatives and similar repositories for ProbingDataset:
Users that are interested in ProbingDataset are comparing it to the libraries listed below
- Awesome Cyber-Security Data-sets Collection☆19Updated 6 years ago
- Botnet Simulation Framework☆77Updated 4 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆74Updated 7 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- A collection of resources for security data☆40Updated 7 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 5 years ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- ☆41Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- A map displaying threat actors from the misp-galaxy☆32Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- Explore Indicators of Compromise Automatically☆94Updated 4 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- Quantitate binary risk assessment☆16Updated 2 years ago
- ☆13Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- A machine learning approach to detect phishing urls☆27Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago