Jupyter Notebooks for Threat Hunting Logo

Jupyter Notebooks for Threat Hunting

0
Free
Visit Website

Jupyter Notebooks are used to create capabilities around categories or stages of threats, allowing users to consume, enrich, and output data for gaining insights that may not be visible otherwise. The tool emphasizes the importance of continuously adding new methods, data sources, and expertise to enhance the hunting process.

FEATURES

ALTERNATIVES

Repository of IOCs provided under the Apache 2.0 license

A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.

A Pythonic framework for automated threat modeling shifting left.

A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data

A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.

Python-based client for IBM XForce Exchange with an improved version available.

A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved