You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
🔍 Framework ML/DL per analisi avanzata di log di sicurezza e detection di attacchi informatici. Identifica pattern MITRE ATT&CK, valuta l'efficacia delle regole Sigma, e automatizza la threat detection con ensemble di modelli. Dashboard interattive e analisi comportamentali.
🛡️ Ever wonder how hackers break into companies? 💀 This interactive platform lets you simulate REAL Active Directory attacks (Password Spray, Kerberoasting, Pass-the-Hash, Golden Ticket) while learning how to DEFEND against them! 🔐 | Built to show both sides of the cybersecurity coin 🪙 | Attack. Detect. Defend. Learn. Repeat. 🔄
CVE Threat Intelligence Toolkit is a research-support platform for security analysts. It connects multiple data sources and tools to help reconstruct CVEs, prepare environments, and extract key behaviors using LLMs.
Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, OSCP solution guides, and current cyber ops TTP to assist companies with the ongoing issue of ransomware attacks on their systems. Zenith is designed to source information from open-source intelligence platforms…
A web application assisting network defenders, analysts, and researchers in the process of mapping adversarial behaviors to MITRE ATT&CK, ACSC ISM and NIST 800-53 frameworks.
DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.