• Stars
    star
    127
  • Rank 282,790 (Top 6 %)
  • Language
    HTML
  • Created over 2 years ago
  • Updated 9 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Collection of Jupyter Notebooks by @fr0gger_

Binder

Notebooks

This repository is a collection of some of my Jupyter Notebook applied to cybersecurity and threat intelligence. If you want to play with the code you can run it here

Retrieved Augmented Generation (RAG) and ATT&CK

This notebook demonstrates how to construct a Retrieval-Augmented Generation (RAG) model using a Large Language Model (LLM), integrated with the ATT&CK framework, to create your own MITRE assistant powered by LLM.
Published: 03 November 2023

Threat Report Summarization Using LLMs and Few-Shot Learning

This notebook is an experiment designed to demonstrate the application of few-shot learning for summarizing threat reports and generating a mind map of the key findings.
Published: 27 September 2023

Pulsedive Lookup Using MSTICpy

This notebook demonstrates how to use MSTICpy to query Pulsedive.
Published: 10 March 2023

ELK Threat Hunting

This notebook demonstrates how to connect to an ElasticSearch instance to retrieve the data and analyse them. The dataset used here is from MalwareBazaar.
Published: 10 September 2022

Malware Bazaar Lookup Using MSTICpy

This notebook demonstrates how to use MSTICpy to query the Malware Bazaar database.
Published: 12 August 2022

10 Python Libs for Malware Analysis and Reverse Engineering

This notebook demonstrates 10 python libraries useful for malware analysis and reverse engineering.
Published: 08 June 2022

Conti Leaks Analysis

This notebook demonstrates a simple way to analyze the Conti Leaks chat logs using Python and msticpy. It proposes a methodology for threat researchers and allows to extract relevant information using Python and visualization.
Published: 02 June 2022

VT Domain Hunting using MSTICpy

Notebook to hunt for domains relationship using msticpy.
Published: 19 May 2022

IoCExtractor using MSTICpy

POC to extract Indicator of Compromised from url using msticpy.
Published: 31 March 2022

Strings Similarity Experimentation

This notebook shows some experiementation with strings similarity using Jaccard distance, hashing and visualization.
Published: 25 July 2020

Support or Contact

You can contact me on Twitter: @fr0gger_

More Repositories

1

Awesome-GPT-Agents

A curated list of GPT agents for cybersecurity
4,833
star
2

awesome-ida-x64-olly-plugin

A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.
1,123
star
3

Awesome_Malware_Techniques

This is a repository of resource about Malware techniques
622
star
4

IATelligence

IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&CK matrix related
Python
342
star
5

vthunting

Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.
Python
156
star
6

Unprotect_Submission

Repository to publish your evasion techniques and contribute to the project
C++
121
star
7

unprotect

Unprotect is a python tool for parsing PE malware and extract evasion techniques.
Python
107
star
8

RocProtect-V1

Emulating Virtual Environment to stay protected against advanced malware
C++
98
star
9

MalwareMuncher

Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enabling users to conduct malware analysis.
JavaScript
40
star
10

SuperPeHasher

SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.
Python
27
star
11

Yara-Unprotect

This repository regroups the Yara Rules for the Unprotect Project
YARA
25
star
12

JupyterUniverse

Jupyter Univere is a search engine for all infosec jupyter notebooks
18
star
13

hash.py

hash.py is a python script that calculates a fingerprint (MD5, SHA256, SHA512). The script also allows you to compare two fingerprints to check if it is consistent. It can be used in digital forensics.
Python
10
star
14

Check-Domain-Availability

Tiny script to verify if a domain or a list of domain is available.
Python
9
star
15

shellcode2exe_package

x64 Windows package of the shellcode2exe tool
7
star
16

strings_similarity

This is a short Jupyter Notebook to demonstrate Strings extraction to generate a graph.
Jupyter Notebook
6
star
17

fr0gger

5
star
18

Scripts_and_Snippets

Scripts and Snippets
Python
5
star
19

scapside.py

A scapside.py is a pretty little tool to perform basic network attacks using Scapy
Python
5
star
20

Timer

Gym Timer
C++
2
star
21

Jupyter-Universe

A repository to centralise Jupyter Notebook about Cybersecurity
1
star