shoumikgoswami / Detect-X-appView external linksLinks
Detect-X Automated Threat Detection by AI
☆32Oct 10, 2019Updated 6 years ago
Alternatives and similar repositories for Detect-X-app
Users that are interested in Detect-X-app are comparing it to the libraries listed below
Sorting:
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated last month
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- ☆15Aug 29, 2025Updated 5 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar.…☆24Jan 28, 2020Updated 6 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- ☆25Jun 25, 2021Updated 4 years ago
- Notes and IoCs of fresh malware☆61Jul 5, 2024Updated last year
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- A live test taking system built using the MEAN STACK☆10Feb 10, 2018Updated 8 years ago
- Advanced threat detection solution for Linux.☆36Dec 5, 2020Updated 5 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Hyperledger fabric demo using the balance transfer code as a base☆13Aug 3, 2018Updated 7 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- Alternative password shadowing scheme☆10Dec 1, 2025Updated 2 months ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- Komodo QT wallet☆10Oct 17, 2022Updated 3 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- [WIP] This is a clone of the TikTok app that uses react under the hood and works on desktop and on mobile.☆11Jan 5, 2023Updated 3 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Sep 2, 2025Updated 5 months ago
- ☆10May 6, 2023Updated 2 years ago