secureshark's Stars
Ramub226/Behavioar-Based-Insider-Threat-Detection-Using-Deep-Learning
Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakage issues by the insiders , So to overcome this insider threats issues we developed a model which detects the insider attack prior. In this we have used LSTM-CNN and BI-LSTM-CNN to deploy a model.
dc401/tensorflow-insiderthreat
Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras
Chaofan-Z/InsiderThreatDetection
Insider threat detection with heterogeneous graph in CERT dataset.
randomuserid/Baltar
Searches for Insider Threat Hunting
center-for-threat-informed-defense/insider-threat-ttp-kb
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
mdsecactivebreach/SharpPack
An Insider Threat Toolkit
trickest/insiders
Archive of Potential Insider Threats
nasbench/SIGMA-Resources
Resources To Learn And Understand SIGMA Rules
PacktPublishing/Automating-Security-Detection-Engineering
Automating Security Detection Engineering, published by Packt
splunk/security_content
Splunk Security Content
dachosen1/Feature-Engineering-for-Fraud-Detection
Implementation of feature engineering from Feature engineering strategies for credit card fraud
PacktPublishing/Practical-Threat-Detection-Engineering
Practical Threat Detection Engineering, Published by Packt
infosecB/awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
blackorbird/APT_REPORT
Interesting APT Report Collection And Some Special IOC
rubiruchi/Insider-Threat-and-Anomaly-Detection-from-User-Activities
Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)
Insider-Threat/Insider-Threat
Creating a resource to help build and manage an Insider Threat program.
lcd-dal/feature-extraction-for-CERT-insider-threat-test-datasets
Feature extraction for CERT insider threat test dataset
raymondino/InsiderThreat-StreamReasoningUseCase
This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the insider threat -- data exfiltration
tabzraz/InsiderThreatDetection
h33tlit/secret-regex-list
List of regex for scraping secret API keys and juicy information.