patternex / awesome-ml-for-threat-detection
A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.
☆19Updated 4 years ago
Alternatives and similar repositories for awesome-ml-for-threat-detection:
Users that are interested in awesome-ml-for-threat-detection are comparing it to the libraries listed below
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 7 years ago
- Yara rules☆19Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 2 months ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆7Updated 2 years ago
- ☆11Updated 4 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆13Updated 9 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated 11 months ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- HoneyDB Python Module☆13Updated 11 months ago
- ☆19Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆14Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆38Updated 2 years ago
- ☆27Updated last week
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 4 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆26Updated 2 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- Can you pay the ransom in your country?☆13Updated last year
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated 11 months ago
- Adversary Emulation Planner☆38Updated 6 months ago
- ☆11Updated 3 years ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago