patternex / awesome-ml-for-threat-detectionLinks
A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.
☆19Updated 4 years ago
Alternatives and similar repositories for awesome-ml-for-threat-detection
Users that are interested in awesome-ml-for-threat-detection are comparing it to the libraries listed below
Sorting:
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆46Updated 2 years ago
- ☆11Updated 4 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆35Updated last month
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- This script is to build Wazuh 4.3 environment☆12Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated 6 months ago
- ☆19Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Updated 2 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Open YARA scan- and search engine☆24Updated 4 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- ☆21Updated 3 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 8 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Searches for Insider Threat Hunting☆32Updated 6 years ago