network security monitoring NIDS HIDS CTI DFIR
-
Updated
Dec 7, 2019
network security monitoring NIDS HIDS CTI DFIR
Knowledgebase of universal truths and technical analysis caveats for CTI and DFIR, in one place.
Power is gainer by sharing knowledge, not hoarding it!
End 2 end pipeline
Python-based tool for analyzing URLs and detecting potential threats using various cybersecurity services.
This taxonomy was designed with the aim of enabling desired sharing and preventing unwanted sharing between Thales Group security communities.
CTI Reporter is a small flask wiki to help index threat intelligence data
Estado del arte de la ciberseguridad
zeek network security monitoring NIDS HIDS
A fork of Spamhole by Dustin Trammell with added safety
A fork of the original mailhoney SMTP honeypot rewritten due to library deprecation
Cortex-Analyzers Modified - SecTeam/CERT/SOC Security orchestration tools on steroids
Digging Deeper in cyber security and threat hunting
Python-based web application project for exploring and analyzing the dark web within the TOR (The Onion Router) network. With a focus on threat intelligence and cybersecurity, our software provides a user-friendly interface for discovering, validating & analyzing onion URLs, DOM rendering, Enumerating Onion URLs and scheduling automated tasks init.
Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on the latest developments and news in Offensive Security World
This repository provides CVE vulnerability download using NVD feeds
In this project I have used Splunk and PCAP Analyser for Splunk to analyse the given PCAP file (Extracted using WireShark) to detect Cyber attacks and other threats and have provide possible safeguard mechanisms.
cybertechwatch Telegram Bot in C# / EF6 / SQLite
This project evaluates the effectiveness of multi-sample deep neural networks (DNN) compared to traditional machine learning algorithms for detecting malware within PDF files. The increasing prevalence and sophistication of malware attacks, particularly those embedded in PDF files, pose significant cybersecurity threats.
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."