Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based on machine learning techniques, independent of static-based signatures.
☆51Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for aktaion2
Users that are interested in aktaion2 are comparing it to the libraries listed below
Sorting:
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 8 months ago
- ☆13Nov 10, 2020Updated 5 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- ☆25Jan 8, 2024Updated 2 years ago
- V1.0☆15Aug 8, 2016Updated 9 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆299Feb 9, 2026Updated last month
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- powershell script to simulate activity by a user☆22Jul 29, 2020Updated 5 years ago
- ☆19Jan 27, 2022Updated 4 years ago
- Simple Imaging. Tactical Triage. Zero Clicks.☆19Oct 31, 2017Updated 8 years ago
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆25Oct 22, 2025Updated 4 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated 2 months ago
- ☆34Apr 5, 2017Updated 8 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- a traefik / nginx companion to create an identity aware proxy like beyondcorp☆29Jan 3, 2019Updated 7 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- FIX (Financial Information eXchange) protocol fuzzer☆24Jul 22, 2022Updated 3 years ago
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated last year
- ☆25Nov 18, 2016Updated 9 years ago