hgascon / security-datasets
A collection of resources for security data
☆41Updated 7 years ago
Alternatives and similar repositories for security-datasets:
Users that are interested in security-datasets are comparing it to the libraries listed below
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 7 months ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆75Updated 7 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Tools to interact with APTnotes reporting/index.☆100Updated 4 years ago
- ☆52Updated 6 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆58Updated 5 years ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- ICS Cybersecurity PCAP respository☆52Updated 6 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆80Updated 3 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- Cyber Threat Intelligence Feeds☆94Updated 8 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- My notes on various topics☆64Updated last year
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- CTI database generator and public dataset☆21Updated 5 years ago
- Awesome Cyber-Security Data-sets Collection☆19Updated 6 years ago
- CIFv3 DeploymentKit☆64Updated 4 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆121Updated 3 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 7 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago