patternex / awesome-ml-for-threat-detection
A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.
☆19Updated 4 years ago
Alternatives and similar repositories for awesome-ml-for-threat-detection:
Users that are interested in awesome-ml-for-threat-detection are comparing it to the libraries listed below
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- ☆24Updated 2 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- ☆11Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 5 months ago
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- Yara rules☆20Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆13Updated 11 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- A script to create and assign SOP tasks into the cases☆18Updated 4 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11Updated 7 years ago
- Site for IWS book content☆18Updated 6 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 4 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆23Updated last year
- This script is to build Wazuh 4.3 environment☆13Updated 2 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆25Updated 4 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆12Updated 2 years ago