There are 4 repositories under cyber-analytics topic.
Cyber Analytics Repository
Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.
WEB-Wordlist-Generator creates related wordlists after scanning your web applications.
Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research includes a scoring model, methodology, and worked examples.
CARET - A tool for viewing cyber analytic relationships
A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.
This repository has a tool and an API for Saudi CERT alerts. Its goal is to help improve the level of cybersecurity awareness in Saudi Arabia. Using AWS Lambda, this project takes Saudi CERT's alerts, organizes them, and makes them easy to get through a public API.
Tools for checking NIK
Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.
Repository contains malware IP addresses of C2 infrastructure
Efficient username search tool with customizable options, detailed results, color-coded output, robust error handling, and intelligent detection of usernames in URLs, titles, descriptions, and HTML content.
DDoS Detection using various ML models(Decision tree, Random Forest, Support Vector Machine(SVM), KNN, Neural Network, Gradient Boosting tree)
Repositório criado para agregar documentos, orientações e demais informações advindas de um grupo de estudos em Segurança de Dados
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Insurance in Cybersecurity.
Ini adalah repository writeup yang dibuat untuk mempelajari tentang Cyber-Security di bidang Ethical Hacking dan Penetration Testing, sehingga dapat melindungi diri dari peretas yang sebenarnya.
CyberRakshak is a comprehensive web application designed to perform a detailed scan of any given website URL. It extracts vital information such as the domain's IP address, server name, subdomains along with their IP addresses and server names, and all URLs found on the main page.
This Go code is used to listen to network traffic, monitor and analyze certain protocols. Users can listen to live traffic from a specific network interface, monitor protocols such as TCP, UDP, ICMP, and record traffic. It can be used in various applications such as network security and performance monitoring.
Creating a machine learning model to detect factors that contribute to cyber attacks in an effort to limit the vulnerability of the average consumer.
🛡️ Email Security Master v2.0 Professional Gmail Security Testing Platform with Enterprise Features Advanced Security Testing Platform featuring comprehensive wordlist support and multi-threaded capabilities. Built for security professionals and system administrators requiring thorough security assessments.
CVE Analysis Dashboard
Robots.txt Scanner and Analyzer
personal blog
Projeto de Pesquisa para criação de uma ferramenta de CyberSegurança
Security Event and Incident Management: A security software that helps recognize and address potential security threats and vulnerabilities.
Let's Become Cybersecurity Analyst With me!!!
Cybersecurity Research & Development A collection of security projects, including pentesting tools, forensic analysis, SIEM integrations, and honeypots—built for learning, testing, and defense.
O propósito aqui é compartilhar meus trabalhos em Cybersegurança, compartilhar dicas e tutoriais envolvendo tanto software quanto hardware, dicas básicas de como se proteger na internet.
A collection of my cybersecurity projects, showcasing skills in network security, penetration testing, cryptography, vulnerability assessments, and incident response. This repository highlights practical applications, tools, and techniques for securing systems and mitigating risks.
Malicious URL Detection is designed to identify potentially harmful URLs using machine learning techniques. The model leverages various features of URLs to classify them as malicious or benign, providing an essential prediction for cybersecurity.