Topic: "threat-detection"
0x4D31/awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Size: 47.7 MB - Last synced at: 27 days ago - Pushed at: 11 months ago - Stars: 4,149 - Forks: 694

elastic/detection-rules
Language: Python - Size: 262 MB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 2,296 - Forks: 567

DataDog/stratus-red-team
:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
Language: Go - Size: 3.73 MB - Last synced at: 12 days ago - Pushed at: 26 days ago - Stars: 2,018 - Forks: 242

akto-api-security/akto
Proactive, Open source API security → API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom tests, Sensitive data exposure
Language: Java - Size: 241 MB - Last synced at: 8 days ago - Pushed at: 8 days ago - Stars: 1,285 - Forks: 244

infosecB/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
Size: 116 KB - Last synced at: 22 days ago - Pushed at: about 2 months ago - Stars: 970 - Forks: 86

thalesgroup-cert/Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Language: Python - Size: 17.2 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 924 - Forks: 132

kunai-project/kunai
Threat-hunting tool for Linux
Language: Rust - Size: 1.32 MB - Last synced at: 4 days ago - Pushed at: 6 days ago - Stars: 867 - Forks: 64

Cyb3r-Monk/Threat-Hunting-and-Detection
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
Language: Jupyter Notebook - Size: 407 KB - Last synced at: 4 days ago - Pushed at: 3 months ago - Stars: 731 - Forks: 105

cyb3rmik3/KQL-threat-hunting-queries
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
Size: 384 KB - Last synced at: 17 days ago - Pushed at: 17 days ago - Stars: 684 - Forks: 76

turbot/tailpipe
select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, right from your terminal.
Language: Go - Size: 40.3 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 433 - Forks: 9

aws-samples/aws-security-workshops
A collection of the latest AWS Security workshops
Language: Jupyter Notebook - Size: 81.4 MB - Last synced at: over 1 year ago - Pushed at: over 2 years ago - Stars: 426 - Forks: 171

nianticlabs/venator
A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalone or with other job schedulers like Nomad.
Language: Go - Size: 356 KB - Last synced at: 6 months ago - Pushed at: 8 months ago - Stars: 353 - Forks: 19

olafhartong/ATTACKdatamap
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Language: PowerShell - Size: 2.5 MB - Last synced at: 14 days ago - Pushed at: over 4 years ago - Stars: 352 - Forks: 64

GoogleCloudPlatform/security-analytics
Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud
Language: Python - Size: 965 KB - Last synced at: 8 days ago - Pushed at: 12 months ago - Stars: 342 - Forks: 71

DataDog/threatest
Threatest is a CLI and Go framework for end-to-end testing threat detection rules.
Language: Go - Size: 382 KB - Last synced at: 7 days ago - Pushed at: about 1 month ago - Stars: 329 - Forks: 23

utmstack/UTMStack
Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
Language: Java - Size: 187 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 276 - Forks: 36

jackaduma/SecBERT
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Language: Python - Size: 490 KB - Last synced at: about 1 month ago - Pushed at: about 2 years ago - Stars: 178 - Forks: 34

spyboy-productions/WebSecProbe
Bypass 403
Language: Jupyter Notebook - Size: 2.69 MB - Last synced at: 9 days ago - Pushed at: 4 months ago - Stars: 147 - Forks: 22

MFMokbel/Crawlector
Crawlector is a threat hunting framework designed for scanning websites for malicious objects.
Size: 287 KB - Last synced at: 6 months ago - Pushed at: over 1 year ago - Stars: 125 - Forks: 10

ine-labs/ThreatSeeker
ThreatSeeker: Threat Hunting via Windows Event Logs
Language: Python - Size: 20.3 MB - Last synced at: about 1 month ago - Pushed at: about 2 years ago - Stars: 120 - Forks: 13

ecstatic-nobel/Analyst-Arsenal 📦
A toolkit for Security Researchers
Language: Python - Size: 5.86 MB - Last synced at: over 1 year ago - Pushed at: over 5 years ago - Stars: 120 - Forks: 36

st0pp3r/awesome-detection-engineer
Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log references, resources, labs, data manipulation online tools, blogs, newsletters, good reads, books, trainings, podcasts, videos and twitter/x accounts.
Language: HTML - Size: 311 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 94 - Forks: 11

jonrau1/SyntheticSun
SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Language: Python - Size: 58 MB - Last synced at: 2 months ago - Pushed at: almost 4 years ago - Stars: 77 - Forks: 16

AlbinoGazelle/esxi-testing-toolkit
🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.
Language: Python - Size: 13 MB - Last synced at: 11 days ago - Pushed at: about 1 month ago - Stars: 73 - Forks: 9

infosecB/detection-as-code
An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.
Language: Python - Size: 33.2 KB - Last synced at: about 2 months ago - Pushed at: about 3 years ago - Stars: 55 - Forks: 14

mthcht/ThreatHunting-Keywords-sigma-rules
Sigma detection rules for hunting with the threathunting-keywords project
Language: Python - Size: 176 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 54 - Forks: 7

swisscom/detections 📦
Threat intelligence and threat detection indicators (IOC, IOA)
Language: YARA - Size: 1.47 MB - Last synced at: 22 days ago - Pushed at: over 4 years ago - Stars: 52 - Forks: 10

Loginsoft-LLC/threat-detection-rules
Threat Detection & Anomaly Detection rules for popular open-source components
Size: 104 KB - Last synced at: 5 months ago - Pushed at: almost 3 years ago - Stars: 50 - Forks: 11

spmedia/PhishingSecLists
To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing pages and other malicious or sketch af financial/crypto fraud websites.
Size: 793 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 48 - Forks: 6

paulveillard/cybersecurity-threat-detection
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Detection & Hunting.
Size: 138 KB - Last synced at: 2 months ago - Pushed at: over 2 years ago - Stars: 41 - Forks: 8

krdmnbrk/atomicgen.io
A simple tool designed to create Atomic Red Team tests with ease.
Language: JavaScript - Size: 722 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 37 - Forks: 4

zcyberseclab/zscan
A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network configurations across your infrastructure.
Language: Go - Size: 32.2 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 37 - Forks: 2

0xN3utr0n/Kanis
Advanced threat detection solution for Linux.
Language: Go - Size: 151 KB - Last synced at: 2 months ago - Pushed at: over 4 years ago - Stars: 36 - Forks: 4

thremulation-station/thremulation-station
Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Language: Shell - Size: 3.33 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 31 - Forks: 10

Truvis/Suricata_Threat-Hunting-Rules
Collection of Suricata rule sets that I use modified to my environments.
Size: 23.4 KB - Last synced at: about 2 years ago - Pushed at: over 4 years ago - Stars: 27 - Forks: 9

shoumikgoswami/Detect-X-app
Detect-X Automated Threat Detection by AI
Language: Jupyter Notebook - Size: 115 KB - Last synced at: almost 2 years ago - Pushed at: over 5 years ago - Stars: 27 - Forks: 25

sefinek/Malicious-IP-Addresses
A list of malicious IP addresses associated with botnets, cyberattacks, and the generation of artificial traffic on websites. Useful for network administrators and security companies to block threats and protect against DDoS attacks.
Language: JavaScript - Size: 19.1 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 23 - Forks: 0

spmedia/Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed
A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.
Size: 490 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 23 - Forks: 1

LogCraftIO/logcraft-cli
Detection-as-Code CI/CD pipeline for modern security operations (SIEM, EDR, XDR, ...)
Language: Rust - Size: 592 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 21 - Forks: 1

Loginsoft-LLC/Linux-Exploit-Detection
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
Language: Open Policy Agent - Size: 67.4 KB - Last synced at: 5 months ago - Pushed at: over 1 year ago - Stars: 21 - Forks: 1

domgolonka/foretoken
A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.
Language: Go - Size: 1.62 MB - Last synced at: 2 months ago - Pushed at: about 1 year ago - Stars: 20 - Forks: 2

MaheshShukla1/SOC-Analyst-Notes
Enhance your cybersecurity skills with comprehensive notes for SOC Analysts. Dive into security operations, incident response, threat hunting, and practical examples to bolster your expertise. Access valuable resources to level up your cybersecurity game on my GitHub repository.
Size: 49.8 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 19 - Forks: 4

patternex/awesome-ml-for-threat-detection
A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.
Size: 46.9 KB - Last synced at: 25 days ago - Pushed at: over 4 years ago - Stars: 19 - Forks: 1

advanced-threat-research/Expert-Rules
Size: 23.4 KB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 15 - Forks: 3

mrheinen/lophiid
A distributed honeypot for monitoring large scale web attacks
Language: Go - Size: 65.9 MB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 14 - Forks: 2

wisepythagoras/honeyshell
An SSH honeypot written entirely in Go.
Language: Go - Size: 104 KB - Last synced at: about 2 months ago - Pushed at: 5 months ago - Stars: 13 - Forks: 2

TeMiroYteHasheo/The-Hunters-Framework
Project to Support The Hunter's Framework (THF)
Size: 4.59 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 11 - Forks: 3

ecstatic-nobel/Not-Anti-Virus
An attmept to block malware before AV scans it.
Language: JavaScript - Size: 11.1 MB - Last synced at: about 2 years ago - Pushed at: about 5 years ago - Stars: 10 - Forks: 2

aws-ia/terraform-aws-guardduty
Configure and deploy AWS GuardDuty.
Language: HCL - Size: 839 KB - Last synced at: about 2 months ago - Pushed at: 11 months ago - Stars: 9 - Forks: 15

aptresearch/datasets
Size: 52.7 MB - Last synced at: over 2 years ago - Pushed at: almost 4 years ago - Stars: 9 - Forks: 3

gabrielcurrie/nist-cybersecurity-library
Technical cyber security resources across the NIST cyber security framework lifecycle
Size: 48.8 KB - Last synced at: over 1 year ago - Pushed at: about 4 years ago - Stars: 8 - Forks: 2

sloopstash/kickstart-elk
Collect Telemetry data from a variety of platforms, workloads, and services to implement Observability using Elastic (ELK) stack.
Language: Dockerfile - Size: 191 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 7 - Forks: 31

frknaykc/Database-Dragon
A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs, Suricata rules, and malware samples to support cybersecurity efforts.
Language: YARA - Size: 171 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 6 - Forks: 0

BayseIntelligence/durable_IOCs
IOCs that appear in this repository are meant to be long-lasting indicators of compromise.
Size: 3.85 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 6 - Forks: 0

kumarvna/terraform-azurerm-mysql-db
Terraform Module to deploy a MySQL Server, MySQL Database other optional resources.
Language: HCL - Size: 1.24 MB - Last synced at: about 2 months ago - Pushed at: almost 3 years ago - Stars: 6 - Forks: 7

anubhavsaxena14/Threat-Detection-using-Sentiment-Analysis
Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.
Language: Python - Size: 44.9 KB - Last synced at: over 2 years ago - Pushed at: about 8 years ago - Stars: 6 - Forks: 6

franckferman/CassandraCTI
🔮 Collect, process, and automatically distribute Cyber Threat Intelligence from RSS feeds across multiple platforms.
Size: 151 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 5 - Forks: 0

CodeByHarri/Sigma2KQL
Sigma Queries turned into KQL for Defender using pysigma
Size: 753 KB - Last synced at: 12 months ago - Pushed at: 12 months ago - Stars: 5 - Forks: 2

Stuxend/opensearch-alerting
opensearch-alerts for threat detection and incident response
Language: Python - Size: 18.6 KB - Last synced at: about 1 year ago - Pushed at: about 3 years ago - Stars: 5 - Forks: 0

iistyler/TreeBeard-IDS
A tree-based neural network system for automatic deeper analysis of intrusions.
Language: Python - Size: 8.93 MB - Last synced at: 5 months ago - Pushed at: about 8 years ago - Stars: 5 - Forks: 2

sergio11/zoneguardian
🌐 ZoneGuardian: A powerful tool to analyze DNS configurations, detect vulnerabilities, and generate actionable security reports. 🔒🚀 Safeguard your digital assets with precision and ease!
Language: Python - Size: 1.13 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 4 - Forks: 0

gabrielcurrie/rapid-hardening
High-level guidance for rapidly hardening an IT environment
Size: 73.2 KB - Last synced at: over 1 year ago - Pushed at: over 4 years ago - Stars: 4 - Forks: 1

A9u3ybaCyb3r/SOC-Phishing-Defense-Simulation
This controlled lab environment emphasizes practical cybersecurity skills, ethical practices, and the importance of proactive defense strategies.
Size: 929 KB - Last synced at: 12 days ago - Pushed at: 13 days ago - Stars: 3 - Forks: 0

sansan-monkey/hunting-rules
Threat Hunting Rules - work in progress
Size: 98.6 KB - Last synced at: 5 months ago - Pushed at: almost 2 years ago - Stars: 3 - Forks: 1

infosecB/generate_attacknav_layer
A Python CLI utility for quickly converting a list or text file of MITRE ATT&CK technique IDs to a MITRE ATT&CK Navigator layer .JSON file.
Language: Python - Size: 33 MB - Last synced at: 3 months ago - Pushed at: over 3 years ago - Stars: 3 - Forks: 0

prashant-kikani/toxic-comment-classifier
To classify toxic and abusive comments from huge bunch of text.
Language: Jupyter Notebook - Size: 1.71 MB - Last synced at: about 2 years ago - Pushed at: over 7 years ago - Stars: 3 - Forks: 2

arnvjshi/Threat-Detection-Dashboard
ThreatShield AI-powered threat detection system using GROQ to analyze audio, image, and text data. It extracts insights and flags potential threats in real-time across multiple media formats.
Language: TypeScript - Size: 397 KB - Last synced at: 14 days ago - Pushed at: about 1 month ago - Stars: 2 - Forks: 0

trendmicro/tm-v1-fs-golang-sdk
Trend Vision One File Security Go SDK
Language: Go - Size: 75.2 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 2 - Forks: 0

Golden-Ratio-Analytic-Services/SaferDrivesMexico
React.js application meant to allow users to avoid high risk zones traveling within and through Mexico.
Language: JavaScript - Size: 366 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

SuchitReddi/Keyloggers-A-Threat-to-Privacy
A review paper on the threats posed by keyloggers and touchloggers
Size: 223 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

Daethyra/OpenDTS 📦
Open Domestic Threat Scanner - LLM Threat-Intelligence
Language: Python - Size: 60 MB - Last synced at: about 1 year ago - Pushed at: almost 2 years ago - Stars: 2 - Forks: 0

blockboard/ThreatMapper Fork of deepfence/ThreatMapper
Identify vulnerabilities in running containers, images, hosts and repositories
Size: 9.84 MB - Last synced at: almost 2 years ago - Pushed at: almost 5 years ago - Stars: 2 - Forks: 2

5kidRo0t/VenomStrike
VenomStrike: A lightweight, blazing-fast malware scanner that identifies known threats via SHA-256, MD5 hashes and YARA rules. Confirms if a file is a known malware sample. No bloat — just raw speed, simplicity, and full portability.
Language: Python - Size: 85 KB - Last synced at: 1 day ago - Pushed at: 2 days ago - Stars: 1 - Forks: 0

raditz22/Awesome-AI-Deception
An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems
Size: 4.88 KB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 1 - Forks: 0

P1rat3R00t/NSFW
For educational and security research purposes only.
Language: C - Size: 716 KB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 1 - Forks: 0

rfackroyd/detection-engineering-starter-pack
A starter pack of resources to help you get started in Detection Engineering.
Size: 12.7 KB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 1 - Forks: 0

lixiasky/X-ray
A high-privilege behavior tracing and anti-malware tool with ISO comparison and auto-elimination capabilities.
Language: Go - Size: 11.5 MB - Last synced at: 16 days ago - Pushed at: 16 days ago - Stars: 1 - Forks: 0

trendmicro/tm-v1-fs-python-sdk
Trend Vision One File Security Python SDK
Language: Python - Size: 148 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 1 - Forks: 1

USRRP/Dark-Web-Threat-Monitor
Language: Python - Size: 16.6 KB - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 1 - Forks: 0

Kzax01/AWS-Security-Aerosecure
AeroSecure: Where Aerospace Meets AWS Security : How to Secure an Aerospace Infra ? Let's see! 🚀☁️🔐
Size: 263 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

infosecB/Rulehound
An index of publicly available and open-source threat detection rulesets.
Size: 286 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

aymenmarjan/MISP-Wazuh-Integration
A comprehensive integration solution connecting MISP threat intelligence with Wazuh security monitoring for real-time threat detection. This project provides step-by-step instructions for deploying, configuring, and integrating MISP and Wazuh with Sysmon to automatically detect indicators of compromise (IoCs) in your environment.
Size: 3.54 MB - Last synced at: about 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

trendmicro/tm-v1-fs-java-sdk
Trend Vision One File Security Java SDK
Language: Java - Size: 96.7 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

DrPwner/FortiLucene
FortiLucene is a Web UI Program Interface that facilitates the FortiEDR Lucene Syntax Query Language
Language: JavaScript - Size: 123 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 1 - Forks: 0

spmedia/Telegram-Channel-Joiner
A python bot that uses the Pyrogram API Framework to take a list of Telegram channels and groups and joins them.
Language: Python - Size: 4.75 MB - Last synced at: 22 days ago - Pushed at: 10 months ago - Stars: 1 - Forks: 2

ns7523/Threat-Detection-in-IoT
An intelligent approach to improving the performance of Threat detection in IOT
Language: HTML - Size: 7.63 MB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

MaheshShukla1/Snort-IDS-Configuration-Rules-and-Examples
This repository provides comprehensive guides, configurations, rules, and practical examples for Snort, the open-source intrusion detection system (IDS). Ideal for cybersecurity professionals and enthusiasts looking to enhance their network security skills.
Size: 24.4 KB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 1 - Forks: 0

EmperialX/Open-Source-SOC
Building one Solution for Threat management and detection for you network with Open source SOC solution.
Language: Shell - Size: 41 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

dyussekeyev/thamara
THAMARA - Threat Hunting with AMSI and YARA
Language: C - Size: 14 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 1

ngpepin/LLM-powered-network-threat-monitor
An AI-assisted threat monitoring solution for networks, leveraging Snort, ntopng, pfSense, pfBlockerNG, and LLM analyses to detect, assess and take action in real time against malicious traffic. Integrates automated blacklist generation and comprehensive threat intelligence reporting via a web page and PDF reports.
Language: Shell - Size: 1.17 MB - Last synced at: 2 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

wayne-andymirny/Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed
A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.
Size: 2.93 KB - Last synced at: 6 days ago - Pushed at: 7 days ago - Stars: 0 - Forks: 0

Lasara26/Attack-Detection-with-Machine-Learning
This project focuses on detecting cyber attacks using machine learning techniques. It employs various algorithms to analyze network traffic and identify potential threats in real-time.
Language: Python - Size: 2.37 MB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 0 - Forks: 0

SriBalaji2112/Advanced-Techniques-for-Detecting-Anomalies-in-EDR-Logs-for-Cybersecurity-SOC-Analytics
This project focuses on building an AI-driven anomaly detection framework that uses the Isolation Forest algorithm to identify suspicious events in unstructured system log data.
Language: Python - Size: 10.6 MB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 0 - Forks: 0

apexbarrel/Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed-ki
A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.
Size: 2.93 KB - Last synced at: 12 days ago - Pushed at: 12 days ago - Stars: 0 - Forks: 0

virtualISP/AI-Powered-Threat-Detection-System
A real-time security monitoring system that combines the ELK Stack (Elasticsearch, Logstash, Kibana) with Ollama's AI models (like Phi-3-mini) to automatically detect and analyze security threats in logs. Ideal for identifying brute-force attacks, SQLi, XSS, and more—with actionable insights visualized in Kibana dashboards.
Language: Python - Size: 189 KB - Last synced at: 18 days ago - Pushed at: 18 days ago - Stars: 0 - Forks: 0

8-rahul/AI-Powered-Cybersecurity-Threat-Detection
AI-powered cybersecurity threat detection system that analyzes failed logins, packet sizes, and request frequency to identify potential threats.
Language: Python - Size: 312 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 0 - Forks: 0

ckvishwa/ai-malware-analysis
AI-powered malware analysis using CAPEv2, Python & ML
Language: Python - Size: 6.63 MB - Last synced at: 22 days ago - Pushed at: 22 days ago - Stars: 0 - Forks: 0

Compcode1/ioc1-recon
This IOC captures a foundational stage in the cyber kill chain: reconnaissance — where the attacker has not yet breached the system, but is actively probing to discover what might be open, unguarded, or improperly exposed.
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 23 days ago - Pushed at: 23 days ago - Stars: 0 - Forks: 0

hassanmajaro/log-anomaly-detector-using-splunk
A splunk-based system for detecting log anomalies, failed logins, and suspicious user behavior using queries, alerts, and dashboards.
Size: 5.27 MB - Last synced at: 24 days ago - Pushed at: 24 days ago - Stars: 0 - Forks: 0

piratianraj/CloudGuardianAI
AI-powered cloud threat detection system that uses machine learning to identify anomalous activities in AWS CloudTrail logs. This system implements isolation forest, autoencoder, and graph-based analysis techniques to detect security threats that traditional methods might miss.
Language: Python - Size: 1.54 MB - Last synced at: 25 days ago - Pushed at: 27 days ago - Stars: 0 - Forks: 0
