stratosphereips / Google-Summer-of-CodeLinks
Core information on Stratosphere's participation on the Google Summer of Code Program
☆27Updated last year
Alternatives and similar repositories for Google-Summer-of-Code
Users that are interested in Google-Summer-of-Code are comparing it to the libraries listed below
Sorting:
- BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies☆55Updated last week
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 4 months ago
- Machine Learning For Cybersecurity.☆68Updated 6 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆157Updated 7 months ago
- Public datasets to help you address various cyber security problems.☆458Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆101Updated last month
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆852Updated this week
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆32Updated last year
- Threat Intel Platform for T-POTs☆159Updated this week
- This is a honeypot for IP camera☆20Updated 2 years ago
- A collection of resources for security data☆41Updated 8 years ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆360Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆256Updated last week
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Updated 5 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆178Updated 11 months ago
- ☆38Updated 7 years ago
- OASIS TC Open Repository: Python APIs for STIX 2☆409Updated 7 months ago
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆69Updated 8 months ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆177Updated 2 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆49Updated 8 years ago
- CyRIS: Cyber Range Instantiation System☆107Updated 11 months ago
- TAXII server implementation in Python from EclecticIQ☆211Updated this week
- Python library using the MISP Rest API☆476Updated this week
- ☆32Updated 3 weeks ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆137Updated last year
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14Updated 6 years ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago