-
Updated
Jun 27, 2024 - Jupyter Notebook
cyber-analytics
Here are 27 public repositories matching this topic...
Malicious URL Detection is designed to identify potentially harmful URLs using machine learning techniques. The model leverages various features of URLs to classify them as malicious or benign, providing an essential prediction for cybersecurity.
-
Updated
Jun 20, 2024 - Jupyter Notebook
Projeto de Pesquisa para criação de uma ferramenta de CyberSegurança
-
Updated
Jun 17, 2024 - Python
Repository contains malware IP addresses of C2 infrastructure
-
Updated
Jun 12, 2024
CyberRakshak is a comprehensive web application designed to perform a detailed scan of any given website URL. It extracts vital information such as the domain's IP address, server name, subdomains along with their IP addresses and server names, and all URLs found on the main page.
-
Updated
Jun 18, 2024 - HTML
Система учета тренировок и статистики для команды по киберспорту
-
Updated
May 31, 2024 - TypeScript
WEB-Wordlist-Generator creates related wordlists after scanning your web applications.
-
Updated
May 26, 2024 - Python
End 2 end pipeline
-
Updated
Jun 21, 2024 - Python
Tools for checking NIK
-
Updated
May 16, 2024 - Go
Efficient username search tool with customizable options, detailed results, color-coded output, robust error handling, and intelligent detection of usernames in URLs, titles, descriptions, and HTML content.
-
Updated
May 11, 2024 - Python
This Go code is used to listen to network traffic, monitor and analyze certain protocols. Users can listen to live traffic from a specific network interface, monitor protocols such as TCP, UDP, ICMP, and record traffic. It can be used in various applications such as network security and performance monitoring.
-
Updated
May 11, 2024 - Go
Cyber Analytics Repository
-
Updated
Apr 3, 2024 - Python
A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.
-
Updated
Feb 29, 2024
Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.
-
Updated
Feb 3, 2024 - Python
Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research includes a scoring model, methodology, and worked examples.
-
Updated
Nov 30, 2023 - Makefile
This repository has a tool and an API for Saudi CERT alerts. Its goal is to help improve the level of cybersecurity awareness in Saudi Arabia. Using AWS Lambda, this project takes Saudi CERT's alerts, organizes them, and makes them easy to get through a public API.
-
Updated
Nov 16, 2023 - Python
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Insurance in Cybersecurity.
-
Updated
Oct 18, 2023
personal blog
-
Updated
Oct 2, 2023 - HTML
Security Event and Incident Management: A security software that helps recognize and address potential security threats and vulnerabilities.
-
Updated
Aug 6, 2023 - PowerShell
Ini adalah repository writeup yang dibuat untuk mempelajari tentang Cyber-Security di bidang Ethical Hacking dan Penetration Testing, sehingga dapat melindungi diri dari peretas yang sebenarnya.
-
Updated
Jul 19, 2023
Improve this page
Add a description, image, and links to the cyber-analytics topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cyber-analytics topic, visit your repo's landing page and select "manage topics."