Kodiyilthekkadil's starred repositories

tg-amp-03-get-samples-add-to-scd

Get samples from Threat Grid and add the SHA256 to AMP Simple Custom Detection

Language:PythonStargazers:1Issues:0Issues:0
Language:PythonStargazers:4Issues:0Issues:0
Language:Jupyter NotebookStargazers:5Issues:0Issues:0

APThreatDetectionSys

Advanced Persistent Threat /Intrusion Detection Sys

Language:PythonStargazers:6Issues:0Issues:0

WiFire

Threat Detection App (CEWIT Hackathon)

Language:SwiftStargazers:6Issues:0Issues:0

awesome-ml-for-threat-detection

A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.

Stargazers:18Issues:0Issues:0

Cheat-Sheets

Cheat sheets for threat hunting, detection and other stuff.

Stargazers:29Issues:0Issues:0

threats

ReaQta-Hive Huntings and Detection as code repo

Language:LuaStargazers:4Issues:0Issues:0

threatintelligenceaggregator

Threat Intelligence Aggregator API example

Language:PythonStargazers:8Issues:0Issues:0

BlackHatAsia2020

Adversary Detection Pipelines: Finally Making Your Threat Intel Useful -- BlackHat Asia 2020 Resources and References

Stargazers:7Issues:0Issues:0

Threat-Detection-and-Reporting-System

to identify the threats, or mishaps beforehand. To achieve this goal, we are currently detecting weapons, firearms, and any suspicious activities, apart from that if any problem occurs, it is going to try to detect if any casualties had happened, and is producing the alert.

Language:Jupyter NotebookLicense:GPL-3.0Stargazers:7Issues:0Issues:0

iot-security-module-preview

Azure Security Center (ASC) provides threat detection capabilities for Azure RTOS devices

License:NOASSERTIONStargazers:2Issues:0Issues:0

Attack-and-Anomaly-Detection-in-IoT-Sensors-in-IoT-Sites-Using-Machine-Learning-Approaches

Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased use of IoT infrastructure in every domain, threats and attacks in these infrastructures are also growing commensurately. Denial of Service, Data Type Probing, Malicious Control, Malicious Operation, Scan, Spying and Wrong Setup are such attacks and anomalies which can cause an IoT system failure. In this paper, performances of several machine learning models have been compared to predict attacks and anomalies on the IoT systems accurately. The machine learning (ML) algorithms that have been used here are Logistic Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), and Artificial Neural Network (ANN). The evaluation metrics used in the comparison of performance are accuracy, precision, recall, f1 score, and area under the Receiver Operating Characteristic Curve. The system obtained 99.4% test accuracy for Decision Tree, Random Forest, and ANN. Though these techniques have the same accuracy, other metrics prove that Random Forest performs comparatively better.

Language:Jupyter NotebookLicense:MITStargazers:41Issues:0Issues:0

blue_team_detection

This repository is the home of threat hunting and security monitoring notebooks

Language:Jupyter NotebookStargazers:4Issues:0Issues:0

detection-stack

Repo for multiformat signatures for threat detection

Language:YARALicense:Apache-2.0Stargazers:7Issues:0Issues:0

JamfProThreatHunting

Scripts to aid intrusion and malware detection using the Jamf Agent and Jamf Server

Language:ShellLicense:MITStargazers:10Issues:0Issues:0

OSNThreatGroups

Threat Network Detection in Online Social Networks

Language:RStargazers:10Issues:0Issues:0

inthreatDNS

A open-source local endpoint DNS threat detection system

Language:PythonLicense:MITStargazers:5Issues:0Issues:0

CloudConstableThreatDetection

NLP Threat Detection for Cloud Constable

Language:Jupyter NotebookStargazers:2Issues:0Issues:0

thremulation-station

Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.

Language:ShellLicense:Apache-2.0Stargazers:34Issues:0Issues:0

ADAPT

Active Detection of Advanced Persistent Threats

Language:HTMLStargazers:7Issues:0Issues:0

insider-threat

Prototype development for Insider Threat Detection and Assessment tools

Language:JavaScriptStargazers:8Issues:0Issues:0

Buried-threat-detection-using-AI-on-GPR-data

We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar. We applied Deep Learning techniques specifically CNN and transfer learning along with image processing techniques like color thresholding, augmentation and masking to identify the threats hidden underground by analysing the radar data. We implemented the techniques given in the research paper (Some Good Practices for Applying Convolutional Neural Networks to Buried Threat Detection in Ground Penetrating Radar, by Daniël Reichman, Leslie M. Collins, Jordan M)

Language:PythonStargazers:17Issues:0Issues:0

data-driven-intrusion-detection

Data-driven detection of cybersecurity threats in IoT networks.

Language:Jupyter NotebookStargazers:6Issues:0Issues:0

perceptor

An open source, cloud native toolkit for threat detection and mitigation

Language:GoLicense:Apache-2.0Stargazers:19Issues:0Issues:0

Kanis

Advanced threat detection solution for Linux.

Language:GoLicense:GPL-3.0Stargazers:35Issues:0Issues:0

dynamite-nsm

DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detection

Language:PythonLicense:GPL-3.0Stargazers:165Issues:0Issues:0

Tylium

Primary data pipelines for intrusion detection, security analytics and threat hunting

License:NOASSERTIONStargazers:88Issues:0Issues:0

attackintel

A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.

Language:PythonLicense:MITStargazers:66Issues:0Issues:0