tardifpm's Stars
NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework
jax-ml/jax
Composable transformations of Python+NumPy programs: differentiate, vectorize, JIT to GPU/TPU, and more
juice-shop/juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
unit8co/darts
A python library for user-friendly forecasting and anomaly detection on time series.
hslatman/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
salesforce/ja3
JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
google/neural-tangents
Fast and Easy Infinite Neural Networks in Python
cisagov/Malcolm
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
open5gs/open5gs
Open5GS is a C-language Open Source implementation for 5G Core and EPC, i.e. the core network of LTE/NR network (Release-17)
microsoft/CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
taviso/ctftool
Interactive CTF Exploration Tool
cisagov/Sparrow
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
P1sec/QCSuper
QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.
contiki-ng/contiki-ng
Contiki-NG: The OS for Next Generation IoT Devices
dfir-iris/iris-web
Collaborative Incident Response platform
Azure/SimuLand
Understand adversary tradecraft and improve detection strategies
arx-deidentifier/arx
ARX is a comprehensive open source data anonymization tool aiming to provide scalability and usability. It supports various anonymization techniques, methods for analyzing data quality and re-identification risks and it supports well-known privacy models, such as k-anonymity, l-diversity, t-closeness and differential privacy.
eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework
The European Digital Identity Wallet
microsoft/TagAnomaly
Anomaly detection analysis and labeling tool, specifically for multiple time series (one time series per category)
microsoft/anomalydetector
SR-CNN
dsg-titech/simblock
An open source blockchain network simulator.
advanced-threat-research/CVE-2020-16898
CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
protoconf/protoconf
Configuration as Code framework based on protobuf and Starlark
lironber/GOAD
Official implementation of "Classification-Based Anomaly Detection for General Data" by Liron Bergman and Yedid Hoshen, ICLR 2020.
ALFA-group/BRON
"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
canada-ca/PCTF-CCP
Pan-Canadian Trust Framework | Cadre de Confiance Pancanadien
IDPros/bok
This is a public comment environment for the IDPro body of knowledge.
invictus-ir/o365_dataset
A dataset containing Office 365 Unified Audit Logs for security research and detection
GoSecure/presentations
Material from presentations done by GoSecure researchers
ireydiak/pyad
Implementations of various deep and shallow anomaly detection algorithms for tabular data