A collection of resources for security data
☆42Nov 23, 2017Updated 8 years ago
Alternatives and similar repositories for security-datasets
Users that are interested in security-datasets are comparing it to the libraries listed below
Sorting:
- Botnet is a form of malware that attacks computers on the internet and controls them with command and control servers to perform a wide v…☆11May 12, 2020Updated 5 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- Speak to your shell using various metaphors sourced from differing cultural dialects.☆14Jan 14, 2021Updated 5 years ago
- ☆12Nov 25, 2020Updated 5 years ago
- ☆16Sep 12, 2018Updated 7 years ago
- Here is a collection of misc malicious PHP code I find on infected web servers. The file names mean nothing as they are usually randomly …☆11Feb 2, 2016Updated 10 years ago
- Reading List for CSIRT Team Members☆17Oct 21, 2019Updated 6 years ago
- VPS Network Cloud Web Applications☆25Nov 3, 2025Updated 4 months ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- ☆49Apr 22, 2013Updated 12 years ago
- Bash one-liners☆28Oct 17, 2013Updated 12 years ago
- ☆24Aug 25, 2015Updated 10 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- THP Forensic Challenges☆23Jul 28, 2023Updated 2 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- bro on debian with elasticsearch support☆24Mar 27, 2017Updated 8 years ago
- A list of awesome iOS categories, extensions, utilities and components.☆12Aug 16, 2019Updated 6 years ago
- The JSON REST API for the National Vulnerability Database☆24Dec 26, 2022Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Jan 22, 2023Updated 3 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆43Nov 18, 2019Updated 6 years ago
- ☆41Feb 18, 2026Updated 2 weeks ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Sep 25, 2020Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆72May 15, 2023Updated 2 years ago
- ☆44Feb 26, 2024Updated 2 years ago
- Lightweight file system☆11Sep 9, 2019Updated 6 years ago
- Ransomware Decryptors☆35Apr 28, 2022Updated 3 years ago
- A curated list of amazingly awesome Cybersecurity datasets☆1,931Mar 2, 2024Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Aug 2, 2022Updated 3 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago