An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: cyber-analytics

thekshitiz/Kshitiz-Cybersecurity-Portfolio

A collection of my cybersecurity projects, showcasing skills in network security, penetration testing, cryptography, vulnerability assessments, and incident response. This repository highlights practical applications, tools, and techniques for securing systems and mitigating risks.

Size: 96.7 KB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 0 - Forks: 0

Tankz0001/INSTA_CYBER

INSTA_CYBER is a Python-powered ethical hacking tool designed for educational and research purposes. Built by Muhammad Sabir Ali (INNO_CYBER), this script simulates brute-force login attempts using a password dictionary and can run anonymously via the Tor network.

Language: Python - Size: 15.6 KB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

ezzeldinadel/attack_flow_detector

Find relevant incidents, logs, events, and alerts to all of your incidents.

Language: Python - Size: 7.58 MB - Last synced at: 15 days ago - Pushed at: 15 days ago - Stars: 45 - Forks: 65

mitre-attack/car

Cyber Analytics Repository

Language: Python - Size: 1.97 MB - Last synced at: 25 days ago - Pushed at: about 1 year ago - Stars: 931 - Forks: 332

Gokul-Krishnan-V-R/000000

Confidential Project: Under Development

Size: 960 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

center-for-threat-informed-defense/summiting-the-pyramid

Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research includes a scoring model, methodology, and worked examples.

Language: Makefile - Size: 13.6 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 36 - Forks: 3

Lsam18/cyber.lsam

Cybersecurity Research & Development A collection of security projects, including pentesting tools, forensic analysis, SIEM integrations, and honeypots—built for learning, testing, and defense.

Language: HTML - Size: 1.23 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

joshmsimpson/robots_analyzer

Robots.txt Scanner and Analyzer

Language: HTML - Size: 315 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

paulveillard/cybersecurity-cyberinsurance

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Insurance in Cybersecurity.

Size: 12.7 KB - Last synced at: about 1 month ago - Pushed at: over 1 year ago - Stars: 3 - Forks: 0

anqorithm/Saudi-CERT-API

This repository has a tool and an API for Saudi CERT alerts. Its goal is to help improve the level of cybersecurity awareness in Saudi Arabia. Using AWS Lambda, this project takes Saudi CERT's alerts, organizes them, and makes them easy to get through a public API.

Language: Python - Size: 1.14 MB - Last synced at: 7 days ago - Pushed at: over 1 year ago - Stars: 11 - Forks: 0

shta-ryuel/Cyber-Security-Attack-Analysis

Analyzed and visualized cybersecurity attack data, identifying trends and attack patterns.

Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

paulveillard/cybersecurity-tools

A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.

Size: 89.8 KB - Last synced at: about 1 month ago - Pushed at: about 1 year ago - Stars: 12 - Forks: 3

center-for-threat-informed-defense/cloud-analytics

Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.

Language: HCL - Size: 12.8 MB - Last synced at: 2 months ago - Pushed at: about 2 years ago - Stars: 52 - Forks: 9

sutharv/Email-Security-Master

🛡️ Email Security Master v2.0 Professional Gmail Security Testing Platform with Enterprise Features Advanced Security Testing Platform featuring comprehensive wordlist support and multi-threaded capabilities. Built for security professionals and system administrators requiring thorough security assessments.

Language: Python - Size: 4.28 MB - Last synced at: 5 months ago - Pushed at: 5 months ago - Stars: 1 - Forks: 0

SUmidcyber/NetFlowCrafter

This Go code is used to listen to network traffic, monitor and analyze certain protocols. Users can listen to live traffic from a specific network interface, monitor protocols such as TCP, UDP, ICMP, and record traffic. It can be used in various applications such as network security and performance monitoring.

Language: Go - Size: 7.81 KB - Last synced at: about 1 month ago - Pushed at: 12 months ago - Stars: 2 - Forks: 1

Kubashok/malicious-c2-infrastructure

Repository contains malware IP addresses of C2 infrastructure

Size: 18.6 KB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 7 - Forks: 0

cypienta/Lambda

End 2 end pipeline

Language: Python - Size: 7.53 MB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 1 - Forks: 0

KamiNoKod0mo/NeithSec

Projeto de Pesquisa para criação de uma ferramenta de CyberSegurança

Language: Python - Size: 3.11 MB - Last synced at: 10 months ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

vishal815/Malicious-URL-Detection-System

Malicious URL Detection is designed to identify potentially harmful URLs using machine learning techniques. The model leverages various features of URLs to classify them as malicious or benign, providing an essential prediction for cybersecurity.

Language: Jupyter Notebook - Size: 2.29 MB - Last synced at: about 1 month ago - Pushed at: 11 months ago - Stars: 0 - Forks: 0

pankajmourya007/CyberRakshak

CyberRakshak is a comprehensive web application designed to perform a detailed scan of any given website URL. It extracts vital information such as the domain's IP address, server name, subdomains along with their IP addresses and server names, and all URLs found on the main page.

Language: HTML - Size: 2.72 MB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 2 - Forks: 0

Mr-Pstar7/NIK-checker

Tools for checking NIK

Language: Go - Size: 84 KB - Last synced at: 12 months ago - Pushed at: 12 months ago - Stars: 3 - Forks: 0

AnonCatalyst/AliaStorm

Efficient username search tool with customizable options, detailed results, color-coded output, robust error handling, and intelligent detection of usernames in URLs, titles, descriptions, and HTML content.

Language: Python - Size: 23.4 KB - Last synced at: 12 months ago - Pushed at: 12 months ago - Stars: 0 - Forks: 0

OsmanKandemir/web-wordlist-generator

WEB-Wordlist-Generator creates related wordlists after scanning your web applications.

Language: Python - Size: 160 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 34 - Forks: 3

CesarIllustrious/CyberSecurityAuditScript

Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.

Language: Python - Size: 23.4 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 9 - Forks: 1

meghabyte-og/SEIM

Security Event and Incident Management: A security software that helps recognize and address potential security threats and vulnerabilities.

Language: PowerShell - Size: 1.97 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

KELASTAMBAH/WRITEUP

Ini adalah repository writeup yang dibuat untuk mempelajari tentang Cyber-Security di bidang Ethical Hacking dan Penetration Testing, sehingga dapat melindungi diri dari peretas yang sebenarnya.

Size: 9.21 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

katariyanikhil/DDoS-Detection-using-ML

DDoS Detection using various ML models(Decision tree, Random Forest, Support Vector Machine(SVM), KNN, Neural Network, Gradient Boosting tree)

Language: Jupyter Notebook - Size: 1.56 MB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 0

Brotherscodes/Cyber_Security_Intrusion_Prevention

Creating a machine learning model to detect factors that contribute to cyber attacks in an effort to limit the vulnerability of the average consumer.

Language: Jupyter Notebook - Size: 44.6 MB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 2

mitre-attack/caret Fork of mitre/caret

CARET - A tool for viewing cyber analytic relationships

Language: JavaScript - Size: 636 KB - Last synced at: about 2 years ago - Pushed at: over 4 years ago - Stars: 21 - Forks: 14

gdscjec/Cyber-analysis

Size: 25.4 KB - Last synced at: 10 months ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 1

Related Keywords
cyber-analytics 30 cybersecurity 24 cyber-security 8 cyber-threat-intelligence 8 security 5 cyber 4 security-tools 4 ddos 3 data-visualization 3 osint 3 python3 2 ctid 2 mitre-attack 2 information-security 2 data-science 2 information-retrieval 2 threat-intelligence 2 data-analysis 2 ethical-hacking 2 redteam 2 cyber-analyst 2 analytics 2 cybersecurity-education 2 cybersecurity-tools 2 malware 2 infosec 2 security-vulnerability 2 hacking 2 mitre-corporation 2 penetration-testing 2 correlation 2 ominis-osint 1 sql 1 python-tools 1 username 1 relational-databases 1 postgresql 1 username-checker 1 username-search 1 machinelearningmodel 1 asset-discovery 1 blueteam-tools 1 cti 1 infiltration 1 cyber-security-analysis 1 cyber-security-data 1 scripts 1 tools 1 machine-learning 1 malicious-url 1 malicious-url-detection 1 url 1 vishal-lazrus 1 hacktoberfest2022 1 visualization 1 checker 1 golang 1 hacking-tools 1 nik 1 osint-tool 1 osint-tools 1 hacktoberfest 1 webattack 1 security-audit 1 security-automation 1 seim 1 threat-hunting 1 analisis 1 ctf 1 ctf-challenges 1 ddos-detector 1 ddos-detection-using-ml 1 ctf-writeup 1 ddos-detection-ml 1 kelastambah 1 pentest 1 ddos-detection 1 pentesting 1 writeup 1 ddos-attacks 1 cyber-security-tool 1 ethical-hacker 1 ddos-using-ml 1 ethical-hacking-tools 1 hack-tool 1 ioc 1 open-source-software 1 ddos-protection 1 open-source-tooling 1 redteam-tools 1 ddos-ml 1 wordlist-generator 1 information 1 information-extraction 1 information-gathering 1 python-3 1 python-script 1 android 1 detection-engineering 1 threat-informed-defense 1