threat-hunting
Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and conf…
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
🍯 T-Pot - The All In One Multi Honeypot Platform 🐝
Cuckoo Sandbox is an automated dynamic malware analysis system
On demand query API for https://github.com/davidonzo/Threat-Intel project.
Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS
A python app to predict Att&ck tactics and techniques from cyber threat reports
Open Cyber Threat Intelligence Platform
Detection of Advanced Persistent Threats using Artificial Intelligence for Deep Packet Inspection
[VLDB'22] Anomaly Detection using Transformers, self-conditioning and adversarial training.
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
A repository for code accompanying the manuscript 'An Evaluation of Anomaly Detection and Diagnosis in Multivariate Time Series' (published at TNNLS)
A toolset to make a system look as if it was the victim of an APT attack
DDoS attack detection using BLSTM based RNN
This repository hosts community contributed Kestrel analytics
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
Cyber Threat Intelligence Repository expressed in STIX 2.0
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Small and highly portable detection tests based on MITRE's ATT&CK.
A set of Zeek scripts to detect ATT&CK techniques.