patternex / awesome-ml-for-threat-detectionLinks
A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.
☆19Updated 4 years ago
Alternatives and similar repositories for awesome-ml-for-threat-detection
Users that are interested in awesome-ml-for-threat-detection are comparing it to the libraries listed below
Sorting:
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- ☆11Updated 4 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- ☆20Updated last year
- Converting data from services like Censys and Shodan to a common data model☆49Updated this week
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 4 months ago
- The pattern matching swiss knife☆10Updated 4 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆64Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- Resources and Discussions About Detection Engineering☆12Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- ☆15Updated 2 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆26Updated 2 years ago
- A script to create and assign SOP tasks into the cases☆20Updated 4 years ago
- ☆21Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Cyber Threats Detection Rules☆14Updated last month