stratosphereips / Google-Summer-of-Code
Core information on Stratosphere's participation on the Google Summer of Code Program
☆26Updated last year
Alternatives and similar repositories for Google-Summer-of-Code:
Users that are interested in Google-Summer-of-Code are comparing it to the libraries listed below
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆30Updated 5 months ago
- Threat Intel Platform for T-POTs☆145Updated this week
- A collection of resources for security data☆41Updated 7 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- ☆106Updated 4 years ago
- Graphics, icons, and diagrams to support STIX 2☆46Updated 3 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆148Updated this week
- Machine Learning For Cybersecurity.☆65Updated 5 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆49Updated 3 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆172Updated 4 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆120Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- Swagger/ OpenAPI specifications for security products and services☆75Updated 3 weeks ago
- Malware Data Science Reading Diary / Notes☆127Updated 5 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆164Updated last year
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆68Updated 3 weeks ago
- Open platform for modelling, collection and exchange of knowledge☆159Updated 3 weeks ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- ☆148Updated 2 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆41Updated 8 months ago
- Hatching Triage public command-line utility and API library.☆65Updated last year
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- A curated list of awesome things related to TheHive & Cortex☆178Updated 3 years ago
- ☆49Updated 6 years ago
- Python API Client for TheHive☆223Updated 2 weeks ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆31Updated 3 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated 2 weeks ago