This repo contains a project to detect threats in ROS 2 topics using YARA rules.
-
Updated
Jul 18, 2023 - Python
This repo contains a project to detect threats in ROS 2 topics using YARA rules.
Anomaly detection using machine learning on the simulated network's data.
Building one Solution for Threat management and detection for you network with Open source SOC solution.
The Threat-Intelligence-Lab is a comprehensive platform that empowers organizations to proactively identify, analyze, and combat cyber threats. We provide real-time threat intelligence, advanced threat analysis tools, and expert guidance to help you stay ahead of the curve and protect your valuable data.
Mapping common adversarial TTP's against Detections & Atomics
A review paper on the threats posed by keyloggers and touchloggers
Traditional methods of threat detection are often insufficient, necessitating the integration of cutting-edge technologies. This code demonstrates how OpenAI's GPT(Generative Pre-trained Transformers) can be utilized for basic level threat detection and entity recognition, enhancing cybersecurity measures. 😎😎 Read full Blog at 👇👇👇
Buliding an siem with simple tools
A Python CLI utility for quickly converting a list or text file of MITRE ATT&CK technique IDs to a MITRE ATT&CK Navigator layer .JSON file.
Threat Hunting and Detection guides on attacker techniques
Open Domestic Threat Scanner - LLM Threat-Intelligence
React.js application meant to allow users to avoid high risk zones traveling within and through Mexico.
opensearch-alerts for threat detection and incident response
Threat Hunting Rules - work in progress
Repo for my detection rules in system relative formatting
Trend Vision One File Security Node.js SDK
XrayVision Benchmark: Benchmarking of X-ray Security Imaging Datasets
A Python notebook demonstrating an Intrusion Detection System for surveillance videos using OpenCV, focusing on real-time threat detection and alert notifications.
Trend Vision One File Security Go SDK
This repository provides comprehensive guides, configurations, rules, and practical examples for Snort, the open-source intrusion detection system (IDS). Ideal for cybersecurity professionals and enthusiasts looking to enhance their network security skills.
Add a description, image, and links to the threat-detection topic page so that developers can more easily learn about it.
To associate your repository with the threat-detection topic, visit your repo's landing page and select "manage topics."