☆14Sep 28, 2023Updated 2 years ago
Alternatives and similar repositories for Threat-Intelligence
Users that are interested in Threat-Intelligence are comparing it to the libraries listed below
Sorting:
- ☆12Nov 16, 2023Updated 2 years ago
- Simple Web app made with Html, CSS and Javascript which convert speech to text.☆11Nov 6, 2022Updated 3 years ago
- This is a beginner's guide to making your arduino robot. Smart phone controlled,wall follower and obstacle avoiding robot.We can learn t…☆10Aug 27, 2022Updated 3 years ago
- ☆11Sep 24, 2022Updated 3 years ago
- ☆10Aug 4, 2022Updated 3 years ago
- ☆15Dec 23, 2023Updated 2 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- ChitoSocket - A Good Socket Server☆70Jan 7, 2026Updated last month
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Esp8266 Nodemcu Wifi Development Deauther With Oled Display☆12Sep 18, 2023Updated 2 years ago
- Repository for integration with Apache Kafka☆14Jul 22, 2022Updated 3 years ago
- Magiccommit: Effortless Git Commits with AI☆10Oct 1, 2023Updated 2 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Scripts and ideas shared with the community.☆14Feb 27, 2026Updated last week
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Automation Framework has many tools commonly used for Network Automation☆10Sep 4, 2025Updated 6 months ago
- Total Anomaly Detection System for software logs and traces☆10Dec 7, 2015Updated 10 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- The hub for all JATS4R meeting notes, examples, draft recommendations, documents, and issues.☆17Sep 8, 2019Updated 6 years ago
- ☆15Feb 25, 2026Updated last week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- SHA-256 implementation in painless for elasticsearch☆13Oct 17, 2022Updated 3 years ago
- ☆15Sep 24, 2024Updated last year
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆20Nov 10, 2024Updated last year
- dga classification with fasttext☆13Oct 29, 2018Updated 7 years ago
- Aprender o uso do Python no SQL Server☆12Aug 26, 2023Updated 2 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- Generate TikZ graphics from tcpdump/Wireshark captures☆20Feb 2, 2013Updated 13 years ago
- Parse Suricata rules☆14Aug 1, 2023Updated 2 years ago
- Install Proxmox 4 on a fresh Debian Jessie. Manage storages & containers☆11Apr 21, 2017Updated 8 years ago
- Live events map as a Kibana plugin☆11Aug 10, 2017Updated 8 years ago