patternex / awesome-ml-for-threat-detection
A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.
☆19Updated 4 years ago
Alternatives and similar repositories for awesome-ml-for-threat-detection
Users that are interested in awesome-ml-for-threat-detection are comparing it to the libraries listed below
Sorting:
- ☆11Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆42Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆24Updated last year
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 7 years ago
- ☆28Updated 4 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- Yara rules☆21Updated 2 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- ☆21Updated 2 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆16Updated 3 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- HoneyDB Python Module☆13Updated last year
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- External twitter feeder for AIL framework☆16Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year