ezzeldinadel's Stars
anuraghazra/github-readme-stats
:zap: Dynamically generated stats for your github readmes
oauth2-proxy/oauth2-proxy
A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.
jgamblin/Mirai-Source-Code
Leaked Mirai Source Code for Research/IoC Development Purposes
RhinoSecurityLabs/cloudgoat
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
olafhartong/sysmon-modular
A repository of sysmon configuration modules
robcowart/elastiflow
Network flow analytics (Netflow, sFlow and IPFIX) with the Elastic Stack
microsoft/msticpy
Microsoft Threat Intelligence Security Tools
cisagov/cset
Cybersecurity Evaluation Tool
OpenSCAP/openscap
NIST Certified SCAP 1.2 toolkit
interpretml/DiCE
Generate Diverse Counterfactual Explanations for any machine learning model.
splunk/security_content
Splunk Security Content
nok/sklearn-porter
Transpile trained scikit-learn estimators to C, Java, JavaScript and others.
ZupIT/horusec
Horusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
dark-lbp/isf
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
stratosphereips/StratosphereLinuxIPS
Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors in the network traffic. Stratosphere Laboratory, AIC, FEL, CVUT in Prague.
splunk/attack_data
A repository of curated datasets from various attacks
Fortiphyd/GRFICSv2
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
GACWR/OpenUBA
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
SecurityBrewery/catalyst
⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident response processes
wesleyraptor/streamingphish
Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.
w3h/isf
ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.
RealityNet/attack-coverage
an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
DarioBalinzo/kafka-connect-elasticsearch-source
Kafka Connect Elasticsearch Source
Kart1keya/Hachi
This tool maps a file's behavior on MITRE ATT&CK matrix.
jakewarren/suricata-rule-generator
Quickly generate suricata rules for IOCs
KaiyangLi1992/Privacy-Preserving-Social-Network-Embedding
Implementation of Adversarial Privacy Graph Embedding in TensorFlow
cypienta/AWS
cypienta/data_mapper_model
cypienta/docs
demarica/Threat-Hunting
威胁狩猎