hgascon / security-datasets
A collection of resources for security data
☆40Updated 7 years ago
Alternatives and similar repositories for security-datasets:
Users that are interested in security-datasets are comparing it to the libraries listed below
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆74Updated 7 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 5 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆133Updated 4 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- Detect cryptocurrency mining traffic with Zeek.☆46Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 9 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆79Updated 3 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- CTI database generator and public dataset☆21Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆53Updated 7 years ago
- ☆21Updated 3 years ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- DGA Domains detection☆62Updated 6 years ago
- A Yara rule generator for finding related samples and hunting☆157Updated 2 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆257Updated 5 years ago
- CIFv3 DeploymentKit☆63Updated 4 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Updated 9 years ago
- Wireshark plugin to display Suricata analysis info☆93Updated 3 years ago