An open API service providing repository metadata for many open source software ecosystems.

Topic: "threat-detection"

0x4D31/awesome-threat-detection

✨ A curated list of awesome threat detection and hunting resources 🕵️‍♂️

Size: 47.7 MB - Last synced at: 27 days ago - Pushed at: 11 months ago - Stars: 4,149 - Forks: 694

elastic/detection-rules

Language: Python - Size: 262 MB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 2,296 - Forks: 567

DataDog/stratus-red-team

:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud

Language: Go - Size: 3.73 MB - Last synced at: 12 days ago - Pushed at: 26 days ago - Stars: 2,018 - Forks: 242

akto-api-security/akto

Proactive, Open source API security → API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom tests, Sensitive data exposure

Language: Java - Size: 241 MB - Last synced at: 8 days ago - Pushed at: 8 days ago - Stars: 1,285 - Forks: 244

infosecB/awesome-detection-engineering

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.

Size: 116 KB - Last synced at: 22 days ago - Pushed at: about 2 months ago - Stars: 970 - Forks: 86

thalesgroup-cert/Watcher

Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.

Language: Python - Size: 17.2 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 924 - Forks: 132

kunai-project/kunai

Threat-hunting tool for Linux

Language: Rust - Size: 1.32 MB - Last synced at: 4 days ago - Pushed at: 6 days ago - Stars: 867 - Forks: 64

Cyb3r-Monk/Threat-Hunting-and-Detection

Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).

Language: Jupyter Notebook - Size: 407 KB - Last synced at: 4 days ago - Pushed at: 3 months ago - Stars: 731 - Forks: 105

cyb3rmik3/KQL-threat-hunting-queries

A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).

Size: 384 KB - Last synced at: 17 days ago - Pushed at: 17 days ago - Stars: 684 - Forks: 76

turbot/tailpipe

select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, right from your terminal.

Language: Go - Size: 40.3 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 433 - Forks: 9

aws-samples/aws-security-workshops

A collection of the latest AWS Security workshops

Language: Jupyter Notebook - Size: 81.4 MB - Last synced at: over 1 year ago - Pushed at: over 2 years ago - Stars: 426 - Forks: 171

nianticlabs/venator

A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalone or with other job schedulers like Nomad.

Language: Go - Size: 356 KB - Last synced at: 6 months ago - Pushed at: 8 months ago - Stars: 353 - Forks: 19

olafhartong/ATTACKdatamap

A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework

Language: PowerShell - Size: 2.5 MB - Last synced at: 14 days ago - Pushed at: over 4 years ago - Stars: 352 - Forks: 64

GoogleCloudPlatform/security-analytics

Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud

Language: Python - Size: 965 KB - Last synced at: 8 days ago - Pushed at: 12 months ago - Stars: 342 - Forks: 71

DataDog/threatest

Threatest is a CLI and Go framework for end-to-end testing threat detection rules.

Language: Go - Size: 382 KB - Last synced at: 7 days ago - Pushed at: about 1 month ago - Stars: 329 - Forks: 23

utmstack/UTMStack

Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.

Language: Java - Size: 187 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 276 - Forks: 36

jackaduma/SecBERT

pretrained BERT model for cyber security text, learned CyberSecurity Knowledge

Language: Python - Size: 490 KB - Last synced at: about 1 month ago - Pushed at: about 2 years ago - Stars: 178 - Forks: 34

spyboy-productions/WebSecProbe

Bypass 403

Language: Jupyter Notebook - Size: 2.69 MB - Last synced at: 9 days ago - Pushed at: 4 months ago - Stars: 147 - Forks: 22

MFMokbel/Crawlector

Crawlector is a threat hunting framework designed for scanning websites for malicious objects.

Size: 287 KB - Last synced at: 6 months ago - Pushed at: over 1 year ago - Stars: 125 - Forks: 10

ine-labs/ThreatSeeker

ThreatSeeker: Threat Hunting via Windows Event Logs

Language: Python - Size: 20.3 MB - Last synced at: about 1 month ago - Pushed at: about 2 years ago - Stars: 120 - Forks: 13

ecstatic-nobel/Analyst-Arsenal 📦

A toolkit for Security Researchers

Language: Python - Size: 5.86 MB - Last synced at: over 1 year ago - Pushed at: over 5 years ago - Stars: 120 - Forks: 36

st0pp3r/awesome-detection-engineer

Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log references, resources, labs, data manipulation online tools, blogs, newsletters, good reads, books, trainings, podcasts, videos and twitter/x accounts.

Language: HTML - Size: 311 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 94 - Forks: 11

jonrau1/SyntheticSun

SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.

Language: Python - Size: 58 MB - Last synced at: 2 months ago - Pushed at: almost 4 years ago - Stars: 77 - Forks: 16

AlbinoGazelle/esxi-testing-toolkit

🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.

Language: Python - Size: 13 MB - Last synced at: 11 days ago - Pushed at: about 1 month ago - Stars: 73 - Forks: 9

infosecB/detection-as-code

An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.

Language: Python - Size: 33.2 KB - Last synced at: about 2 months ago - Pushed at: about 3 years ago - Stars: 55 - Forks: 14

mthcht/ThreatHunting-Keywords-sigma-rules

Sigma detection rules for hunting with the threathunting-keywords project

Language: Python - Size: 176 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 54 - Forks: 7

swisscom/detections 📦

Threat intelligence and threat detection indicators (IOC, IOA)

Language: YARA - Size: 1.47 MB - Last synced at: 22 days ago - Pushed at: over 4 years ago - Stars: 52 - Forks: 10

Loginsoft-LLC/threat-detection-rules

Threat Detection & Anomaly Detection rules for popular open-source components

Size: 104 KB - Last synced at: 5 months ago - Pushed at: almost 3 years ago - Stars: 50 - Forks: 11

spmedia/PhishingSecLists

To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing pages and other malicious or sketch af financial/crypto fraud websites.

Size: 793 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 48 - Forks: 6

paulveillard/cybersecurity-threat-detection

An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Detection & Hunting.

Size: 138 KB - Last synced at: 2 months ago - Pushed at: over 2 years ago - Stars: 41 - Forks: 8

krdmnbrk/atomicgen.io

A simple tool designed to create Atomic Red Team tests with ease.

Language: JavaScript - Size: 722 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 37 - Forks: 4

zcyberseclab/zscan

A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network configurations across your infrastructure.

Language: Go - Size: 32.2 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 37 - Forks: 2

0xN3utr0n/Kanis

Advanced threat detection solution for Linux.

Language: Go - Size: 151 KB - Last synced at: 2 months ago - Pushed at: over 4 years ago - Stars: 36 - Forks: 4

thremulation-station/thremulation-station

Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.

Language: Shell - Size: 3.33 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 31 - Forks: 10

Truvis/Suricata_Threat-Hunting-Rules

Collection of Suricata rule sets that I use modified to my environments.

Size: 23.4 KB - Last synced at: about 2 years ago - Pushed at: over 4 years ago - Stars: 27 - Forks: 9

shoumikgoswami/Detect-X-app

Detect-X Automated Threat Detection by AI

Language: Jupyter Notebook - Size: 115 KB - Last synced at: almost 2 years ago - Pushed at: over 5 years ago - Stars: 27 - Forks: 25

sefinek/Malicious-IP-Addresses

A list of malicious IP addresses associated with botnets, cyberattacks, and the generation of artificial traffic on websites. Useful for network administrators and security companies to block threats and protect against DDoS attacks.

Language: JavaScript - Size: 19.1 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 23 - Forks: 0

spmedia/Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed

A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.

Size: 490 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 23 - Forks: 1

LogCraftIO/logcraft-cli

Detection-as-Code CI/CD pipeline for modern security operations (SIEM, EDR, XDR, ...)

Language: Rust - Size: 592 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 21 - Forks: 1

Loginsoft-LLC/Linux-Exploit-Detection

Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma

Language: Open Policy Agent - Size: 67.4 KB - Last synced at: 5 months ago - Pushed at: over 1 year ago - Stars: 21 - Forks: 1

domgolonka/foretoken

A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.

Language: Go - Size: 1.62 MB - Last synced at: 2 months ago - Pushed at: about 1 year ago - Stars: 20 - Forks: 2

MaheshShukla1/SOC-Analyst-Notes

Enhance your cybersecurity skills with comprehensive notes for SOC Analysts. Dive into security operations, incident response, threat hunting, and practical examples to bolster your expertise. Access valuable resources to level up your cybersecurity game on my GitHub repository.

Size: 49.8 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 19 - Forks: 4

patternex/awesome-ml-for-threat-detection

A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.

Size: 46.9 KB - Last synced at: 25 days ago - Pushed at: over 4 years ago - Stars: 19 - Forks: 1

advanced-threat-research/Expert-Rules

Size: 23.4 KB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 15 - Forks: 3

mrheinen/lophiid

A distributed honeypot for monitoring large scale web attacks

Language: Go - Size: 65.9 MB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 14 - Forks: 2

wisepythagoras/honeyshell

An SSH honeypot written entirely in Go.

Language: Go - Size: 104 KB - Last synced at: about 2 months ago - Pushed at: 5 months ago - Stars: 13 - Forks: 2

TeMiroYteHasheo/The-Hunters-Framework

Project to Support The Hunter's Framework (THF)

Size: 4.59 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 11 - Forks: 3

ecstatic-nobel/Not-Anti-Virus

An attmept to block malware before AV scans it.

Language: JavaScript - Size: 11.1 MB - Last synced at: about 2 years ago - Pushed at: about 5 years ago - Stars: 10 - Forks: 2

aws-ia/terraform-aws-guardduty

Configure and deploy AWS GuardDuty.

Language: HCL - Size: 839 KB - Last synced at: about 2 months ago - Pushed at: 11 months ago - Stars: 9 - Forks: 15

aptresearch/datasets

Size: 52.7 MB - Last synced at: over 2 years ago - Pushed at: almost 4 years ago - Stars: 9 - Forks: 3

gabrielcurrie/nist-cybersecurity-library

Technical cyber security resources across the NIST cyber security framework lifecycle

Size: 48.8 KB - Last synced at: over 1 year ago - Pushed at: about 4 years ago - Stars: 8 - Forks: 2

sloopstash/kickstart-elk

Collect Telemetry data from a variety of platforms, workloads, and services to implement Observability using Elastic (ELK) stack.

Language: Dockerfile - Size: 191 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 7 - Forks: 31

frknaykc/Database-Dragon

A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs, Suricata rules, and malware samples to support cybersecurity efforts.

Language: YARA - Size: 171 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 6 - Forks: 0

BayseIntelligence/durable_IOCs

IOCs that appear in this repository are meant to be long-lasting indicators of compromise.

Size: 3.85 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 6 - Forks: 0

kumarvna/terraform-azurerm-mysql-db

Terraform Module to deploy a MySQL Server, MySQL Database other optional resources.

Language: HCL - Size: 1.24 MB - Last synced at: about 2 months ago - Pushed at: almost 3 years ago - Stars: 6 - Forks: 7

anubhavsaxena14/Threat-Detection-using-Sentiment-Analysis

Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.

Language: Python - Size: 44.9 KB - Last synced at: over 2 years ago - Pushed at: about 8 years ago - Stars: 6 - Forks: 6

franckferman/CassandraCTI

🔮 Collect, process, and automatically distribute Cyber Threat Intelligence from RSS feeds across multiple platforms.

Size: 151 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 5 - Forks: 0

CodeByHarri/Sigma2KQL

Sigma Queries turned into KQL for Defender using pysigma

Size: 753 KB - Last synced at: 12 months ago - Pushed at: 12 months ago - Stars: 5 - Forks: 2

Stuxend/opensearch-alerting

opensearch-alerts for threat detection and incident response

Language: Python - Size: 18.6 KB - Last synced at: about 1 year ago - Pushed at: about 3 years ago - Stars: 5 - Forks: 0

iistyler/TreeBeard-IDS

A tree-based neural network system for automatic deeper analysis of intrusions.

Language: Python - Size: 8.93 MB - Last synced at: 5 months ago - Pushed at: about 8 years ago - Stars: 5 - Forks: 2

sergio11/zoneguardian

🌐 ZoneGuardian: A powerful tool to analyze DNS configurations, detect vulnerabilities, and generate actionable security reports. 🔒🚀 Safeguard your digital assets with precision and ease!

Language: Python - Size: 1.13 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 4 - Forks: 0

gabrielcurrie/rapid-hardening

High-level guidance for rapidly hardening an IT environment

Size: 73.2 KB - Last synced at: over 1 year ago - Pushed at: over 4 years ago - Stars: 4 - Forks: 1

A9u3ybaCyb3r/SOC-Phishing-Defense-Simulation

This controlled lab environment emphasizes practical cybersecurity skills, ethical practices, and the importance of proactive defense strategies.

Size: 929 KB - Last synced at: 12 days ago - Pushed at: 13 days ago - Stars: 3 - Forks: 0

sansan-monkey/hunting-rules

Threat Hunting Rules - work in progress

Size: 98.6 KB - Last synced at: 5 months ago - Pushed at: almost 2 years ago - Stars: 3 - Forks: 1

infosecB/generate_attacknav_layer

A Python CLI utility for quickly converting a list or text file of MITRE ATT&CK technique IDs to a MITRE ATT&CK Navigator layer .JSON file.

Language: Python - Size: 33 MB - Last synced at: 3 months ago - Pushed at: over 3 years ago - Stars: 3 - Forks: 0

prashant-kikani/toxic-comment-classifier

To classify toxic and abusive comments from huge bunch of text.

Language: Jupyter Notebook - Size: 1.71 MB - Last synced at: about 2 years ago - Pushed at: over 7 years ago - Stars: 3 - Forks: 2

arnvjshi/Threat-Detection-Dashboard

ThreatShield AI-powered threat detection system using GROQ to analyze audio, image, and text data. It extracts insights and flags potential threats in real-time across multiple media formats.

Language: TypeScript - Size: 397 KB - Last synced at: 14 days ago - Pushed at: about 1 month ago - Stars: 2 - Forks: 0

trendmicro/tm-v1-fs-golang-sdk

Trend Vision One File Security Go SDK

Language: Go - Size: 75.2 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 2 - Forks: 0

Golden-Ratio-Analytic-Services/SaferDrivesMexico

React.js application meant to allow users to avoid high risk zones traveling within and through Mexico.

Language: JavaScript - Size: 366 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

SuchitReddi/Keyloggers-A-Threat-to-Privacy

A review paper on the threats posed by keyloggers and touchloggers

Size: 223 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

Daethyra/OpenDTS 📦

Open Domestic Threat Scanner - LLM Threat-Intelligence

Language: Python - Size: 60 MB - Last synced at: about 1 year ago - Pushed at: almost 2 years ago - Stars: 2 - Forks: 0

blockboard/ThreatMapper Fork of deepfence/ThreatMapper

Identify vulnerabilities in running containers, images, hosts and repositories

Size: 9.84 MB - Last synced at: almost 2 years ago - Pushed at: almost 5 years ago - Stars: 2 - Forks: 2

5kidRo0t/VenomStrike

VenomStrike: A lightweight, blazing-fast malware scanner that identifies known threats via SHA-256, MD5 hashes and YARA rules. Confirms if a file is a known malware sample. No bloat — just raw speed, simplicity, and full portability.

Language: Python - Size: 85 KB - Last synced at: 1 day ago - Pushed at: 2 days ago - Stars: 1 - Forks: 0

raditz22/Awesome-AI-Deception

An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems

Size: 4.88 KB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 1 - Forks: 0

P1rat3R00t/NSFW

For educational and security research purposes only.

Language: C - Size: 716 KB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 1 - Forks: 0

rfackroyd/detection-engineering-starter-pack

A starter pack of resources to help you get started in Detection Engineering.

Size: 12.7 KB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 1 - Forks: 0

lixiasky/X-ray

A high-privilege behavior tracing and anti-malware tool with ISO comparison and auto-elimination capabilities.

Language: Go - Size: 11.5 MB - Last synced at: 16 days ago - Pushed at: 16 days ago - Stars: 1 - Forks: 0

trendmicro/tm-v1-fs-python-sdk

Trend Vision One File Security Python SDK

Language: Python - Size: 148 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 1 - Forks: 1

USRRP/Dark-Web-Threat-Monitor

Language: Python - Size: 16.6 KB - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 1 - Forks: 0

Kzax01/AWS-Security-Aerosecure

AeroSecure: Where Aerospace Meets AWS Security : How to Secure an Aerospace Infra ? Let's see! 🚀☁️🔐

Size: 263 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

infosecB/Rulehound

An index of publicly available and open-source threat detection rulesets.

Size: 286 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

aymenmarjan/MISP-Wazuh-Integration

A comprehensive integration solution connecting MISP threat intelligence with Wazuh security monitoring for real-time threat detection. This project provides step-by-step instructions for deploying, configuring, and integrating MISP and Wazuh with Sysmon to automatically detect indicators of compromise (IoCs) in your environment.

Size: 3.54 MB - Last synced at: about 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

trendmicro/tm-v1-fs-java-sdk

Trend Vision One File Security Java SDK

Language: Java - Size: 96.7 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

DrPwner/FortiLucene

FortiLucene is a Web UI Program Interface that facilitates the FortiEDR Lucene Syntax Query Language

Language: JavaScript - Size: 123 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 1 - Forks: 0

spmedia/Telegram-Channel-Joiner

A python bot that uses the Pyrogram API Framework to take a list of Telegram channels and groups and joins them.

Language: Python - Size: 4.75 MB - Last synced at: 22 days ago - Pushed at: 10 months ago - Stars: 1 - Forks: 2

ns7523/Threat-Detection-in-IoT

An intelligent approach to improving the performance of Threat detection in IOT

Language: HTML - Size: 7.63 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

MaheshShukla1/Snort-IDS-Configuration-Rules-and-Examples

This repository provides comprehensive guides, configurations, rules, and practical examples for Snort, the open-source intrusion detection system (IDS). Ideal for cybersecurity professionals and enthusiasts looking to enhance their network security skills.

Size: 24.4 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 1 - Forks: 0

EmperialX/Open-Source-SOC

Building one Solution for Threat management and detection for you network with Open source SOC solution.

Language: Shell - Size: 41 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

dyussekeyev/thamara

THAMARA - Threat Hunting with AMSI and YARA

Language: C - Size: 14 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 1

ngpepin/LLM-powered-network-threat-monitor

An AI-assisted threat monitoring solution for networks, leveraging Snort, ntopng, pfSense, pfBlockerNG, and LLM analyses to detect, assess and take action in real time against malicious traffic. Integrates automated blacklist generation and comprehensive threat intelligence reporting via a web page and PDF reports.

Language: Shell - Size: 1.17 MB - Last synced at: 2 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

wayne-andymirny/Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed

A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.

Size: 2.93 KB - Last synced at: 6 days ago - Pushed at: 7 days ago - Stars: 0 - Forks: 0

Lasara26/Attack-Detection-with-Machine-Learning

This project focuses on detecting cyber attacks using machine learning techniques. It employs various algorithms to analyze network traffic and identify potential threats in real-time.

Language: Python - Size: 2.37 MB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 0 - Forks: 0

SriBalaji2112/Advanced-Techniques-for-Detecting-Anomalies-in-EDR-Logs-for-Cybersecurity-SOC-Analytics

This project focuses on building an AI-driven anomaly detection framework that uses the Isolation Forest algorithm to identify suspicious events in unstructured system log data.

Language: Python - Size: 10.6 MB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 0 - Forks: 0

apexbarrel/Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed-ki

A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.

Size: 2.93 KB - Last synced at: 12 days ago - Pushed at: 12 days ago - Stars: 0 - Forks: 0

virtualISP/AI-Powered-Threat-Detection-System

A real-time security monitoring system that combines the ELK Stack (Elasticsearch, Logstash, Kibana) with Ollama's AI models (like Phi-3-mini) to automatically detect and analyze security threats in logs. Ideal for identifying brute-force attacks, SQLi, XSS, and more—with actionable insights visualized in Kibana dashboards.

Language: Python - Size: 189 KB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

8-rahul/AI-Powered-Cybersecurity-Threat-Detection

AI-powered cybersecurity threat detection system that analyzes failed logins, packet sizes, and request frequency to identify potential threats.

Language: Python - Size: 312 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 0 - Forks: 0

ckvishwa/ai-malware-analysis

AI-powered malware analysis using CAPEv2, Python & ML

Language: Python - Size: 6.63 MB - Last synced at: 22 days ago - Pushed at: 22 days ago - Stars: 0 - Forks: 0

Compcode1/ioc1-recon

This IOC captures a foundational stage in the cyber kill chain: reconnaissance — where the attacker has not yet breached the system, but is actively probing to discover what might be open, unguarded, or improperly exposed.

Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 23 days ago - Pushed at: 23 days ago - Stars: 0 - Forks: 0

hassanmajaro/log-anomaly-detector-using-splunk

A splunk-based system for detecting log anomalies, failed logins, and suspicious user behavior using queries, alerts, and dashboards.

Size: 5.27 MB - Last synced at: 24 days ago - Pushed at: 24 days ago - Stars: 0 - Forks: 0

piratianraj/CloudGuardianAI

AI-powered cloud threat detection system that uses machine learning to identify anomalous activities in AWS CloudTrail logs. This system implements isolation forest, autoencoder, and graph-based analysis techniques to detect security threats that traditional methods might miss.

Language: Python - Size: 1.54 MB - Last synced at: 25 days ago - Pushed at: 27 days ago - Stars: 0 - Forks: 0