Detect-X Automated Threat Detection by AI
☆32Oct 10, 2019Updated 6 years ago
Alternatives and similar repositories for Detect-X-app
Users that are interested in Detect-X-app are comparing it to the libraries listed below
Sorting:
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- ☆16Aug 29, 2025Updated 6 months ago
- ☆21May 19, 2016Updated 9 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou …☆26Oct 3, 2023Updated 2 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- The Console Monitor Driver is a KMDF kernel-mode filter driver that captures certain Fast I/O operations (input and output) that is sent …☆41Sep 6, 2022Updated 3 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- A live test taking system built using the MEAN STACK☆10Feb 10, 2018Updated 8 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Inventory Management App - Built With Strapi and React - Taught in The Complete Strapi Course☆10Jan 11, 2023Updated 3 years ago
- an extension of the strapi-provider-upload-cloudinary that allows for a default_folder option in the config as well as using the file nam…☆12Aug 2, 2020Updated 5 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Advanced threat detection solution for Linux.☆36Dec 5, 2020Updated 5 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 weeks ago
- Bugs Framework☆10Updated this week
- Hyperledger fabric demo using the balance transfer code as a base☆13Aug 3, 2018Updated 7 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- ☆11Feb 26, 2026Updated last week
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Komodo Packages (previously called Resources) is where we collect community contributions to Komodo that allow you to customize Komodo in…☆15Jan 4, 2022Updated 4 years ago
- Simple proof of concept that wraps TodoMVC into Electron desktop app with custom protocol support☆11Nov 2, 2016Updated 9 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Get yer TLD data here! Scraped straight from DNS, ICANN and IANA. Including branded gTLDs and whether or not there's registry restriction…☆11Apr 25, 2021Updated 4 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 3 weeks ago
- A lib that helps you create layer oriented canvas applications☆14Oct 5, 2019Updated 6 years ago
- ☆10May 6, 2023Updated 2 years ago