stratosphereips / Google-Summer-of-CodeLinks
Core information on Stratosphere's participation on the Google Summer of Code Program
☆26Updated last year
Alternatives and similar repositories for Google-Summer-of-Code
Users that are interested in Google-Summer-of-Code are comparing it to the libraries listed below
Sorting:
- A collection of resources for security data☆41Updated 7 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆151Updated 2 months ago
- Threat Intel Platform for T-POTs☆156Updated last week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆95Updated last year
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆247Updated this week
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆807Updated this week
- Python library using the MISP Rest API☆470Updated last week
- An awesome list of resources on deception-based security with honeypots and honeytokens☆175Updated 6 months ago
- Code for shelLM tool☆55Updated 5 months ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆355Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated last month
- A web application for generating, parsing and validating, manipulating, visualizing and executing CACAO v2.0 playbooks.☆32Updated 3 months ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆238Updated last year
- Malware Data Science Reading Diary / Notes☆128Updated 6 years ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆279Updated this week
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- Automated handling of data feeds for security teams☆138Updated 2 weeks ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆573Updated last week
- Public datasets to help you address various cyber security problems.☆437Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- OASIS TC Open Repository: Python APIs for STIX 2☆389Updated 2 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆53Updated 4 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆95Updated 11 months ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆89Updated 3 weeks ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆164Updated last year