| activecm/rita |
2,363 |
|
0 |
0 |
over 2 years ago |
45 |
December 01, 2021 |
84 |
gpl-3.0 |
Go |
| Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis. |
| cyber-research/APTMalware |
220 |
|
0 |
0 |
over 3 years ago |
0 |
|
3 |
|
|
| APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples |
| 0xsha/sweetie-data |
139 |
|
0 |
0 |
about 6 years ago |
0 |
|
0 |
other |
|
| This repo contains logstash of various honeypots |
| sooshie/secrepo |
119 |
|
0 |
0 |
over 4 years ago |
0 |
|
0 |
|
HTML |
| Sweet, sweet, secrepo.com html. |
| AbertayMachineLearningGroup/network-threats-taxonomy |
70 |
|
0 |
0 |
almost 6 years ago |
0 |
|
0 |
gpl-3.0 |
TeX |
| Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies |
| mosse-security/threat-hunting-samples |
33 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
|
|
| Three datasets to practice Threat Hunting against. |
| hgascon/security-datasets |
15 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
|
|
| A collection of resources for security data |
| raymondino/InsiderThreat-StreamReasoningUseCase |
12 |
|
0 |
0 |
over 9 years ago |
0 |
|
1 |
|
Web Ontology Language |
| This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the insider threat -- data exfiltration |
| viczong/cybersecurity_threat_severity_analysis |
12 |
|
0 |
0 |
almost 7 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media". |
| Astrolavos/THACO |
6 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
mit |
JavaScript |
| This repository includes all the code necessary to run THreat Analysis COnsole (THACO), an open source DNS-based threat analysis console. |