ThePhish: an automated phishing email analysis tool
-
Updated
Aug 1, 2024 - Python
ThePhish: an automated phishing email analysis tool
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Windows Exploit Protection Settings (Ultimate) GUI
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
This repository is a collection of detailed notes, summaries, and resources to help you prepare for the Google Cybersecurity Professional Certificate. Whether you're aiming to enhance your knowledge in cybersecurity or working towards obtaining the certification, these notes can serve as a valuable reference.
Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC and monitoring.
SOC Analyst Level 1 Replacement using RAG LLM
Pick and convert to specific backends for sigma rules within neovim
A Collection Of Cyber security and Hacking Scripts for Both Red and Blue team to make life a bit easier
A comprehensive Python-based network security tool designed to monitor and protect your local network. The tool provides a robust suite of features for scanning, identifying, and monitoring devices on your network, helping you detect potential intruders and suspicious activity.
In this article, we explore the role of OSINT (Open-Source Intelligence) in computer security. Learn how OSINT leverages publicly available data to identify threats, assess vulnerabilities, and enhance incident response, along with best practices and tools for effective implementation.
Cyber Offense and Defense Project - Università della Calabria
Threat Categorization Based on Malware’s C2 Communication in PCAP file
Top-common-usernames
A research platform to develop Cyberdefense Multi-Agent Systems combining Multi-Agent-Reinforcement Learning to assist designers to find a suited organization regarding constraints and goals
This article delves into the workings of WAF technology, provides concrete examples and use cases, and offers insights into how organizations can leverage this technology for enhanced security.
Lockheed Martin's Cyber Kill Chain aids in cybersecurity defense strategies.
A machine learning system for detecting data exfiltration attempts
Discover an awesome compilation of tools, libraries, and resources for robust security. From network to web security, find everything you need to enhance your security expertise.
Add a description, image, and links to the cyberdefense topic page so that developers can more easily learn about it.
To associate your repository with the cyberdefense topic, visit your repo's landing page and select "manage topics."