stratosphereips / Google-Summer-of-CodeLinks
Core information on Stratosphere's participation on the Google Summer of Code Program
☆26Updated last year
Alternatives and similar repositories for Google-Summer-of-Code
Users that are interested in Google-Summer-of-Code are comparing it to the libraries listed below
Sorting:
- The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.☆30Updated 7 months ago
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- Threat Intel Platform for T-POTs☆153Updated this week
- ☆31Updated 2 months ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆174Updated 6 months ago
- BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies☆46Updated this week
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 10 months ago
- A collection of resources for security data☆41Updated 7 years ago
- the IoT and OT (Operational Technology) Honeypot☆25Updated last year
- ☆28Updated 4 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 10 months ago
- Code for shelLM tool☆55Updated 4 months ago
- Definition, description and relationship types of MISP objects☆99Updated this week
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c …☆41Updated last year
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Public datasets to help you address various cyber security problems.☆431Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- ☆28Updated 5 years ago
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆34Updated 2 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- ☆37Updated 7 years ago
- A DICOM honeypot for detecting and logging unauthorized access attempts☆40Updated last month
- Awesome Cyber-Security Data-sets Collection☆19Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 weeks ago
- An open source platform to support analysts to organise their case and tasks☆84Updated 2 weeks ago
- ATLAS tactics, techniques, and case studies data☆74Updated 2 months ago
- A list of cybersecurity projects that use machine learning techniques☆63Updated 8 years ago