Lists (1)
Sort Name ascending (A-Z)
Stars
A curated list of Awesome Threat Intelligence resources
A list of JARM hashes for different ssl implementations used by some C2/red team tools.
Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications
Convert EVTX to CSV => Logstash reads CSV's and outputs to Elasticsearch
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…
Starter code to solve real world text data problems. Includes: Gensim Word2Vec, phrase embeddings, Text Classification with Logistic Regression, word count with pyspark, simple text preprocessing, …
Home for Elasticsearch examples available to everyone. It's a great way to get started.