Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/fr0gger/jupyter-collection

Collection of Jupyter Notebooks by @fr0gger_
https://github.com/fr0gger/jupyter-collection

cybersecurity malware-analysis python threat-intelligence

Last synced: 7 days ago
JSON representation

Collection of Jupyter Notebooks by @fr0gger_

Awesome Lists containing this project

README

        

[![Binder](https://mybinder.org/badge_logo.svg)](https://mybinder.org/v2/gh/fr0gger/jupyter-collection.git/HEAD)

# Notebooks
This repository is a collection of some of my Jupyter Notebook applied to cybersecurity and threat intelligence. If you want to play with the code you can run it [here](https://mybinder.org/v2/gh/fr0gger/jupyter-collection.git/HEAD)


### [I-SOON Data Leak Analysis using OCR and Generative AI](https://fr0gger.github.io/jupyter-collection/ISOON_DataLeak_OCR_GenAI/ISOON_ChinLeaks.html)
This notebook demonstrates how to analyze a data leak in Chinese from PNG files leveraging python, OCR, Translation and Generative AI.

*Published: 21 February 2024*

### [Retrieved Augmented Generation (RAG) and ATT&CK](https://fr0gger.github.io/jupyter-collection/RAG_ATT%26CK/RAG_ATT%26CK.html)
This notebook demonstrates how to construct a Retrieval-Augmented Generation (RAG) model using a Large Language Model (LLM), integrated with the ATT&CK framework, to create your own MITRE assistant powered by LLM.

*Published: 03 November 2023*

### [Threat Report Summarization Using LLMs and Few-Shot Learning](https://fr0gger.github.io/jupyter-collection/Threat_Report_Summarization/Threat_Summarization_Few_shot_learning.html)
This notebook is an experiment designed to demonstrate the application of few-shot learning for summarizing threat reports and generating a mind map of the key findings.

*Published: 27 September 2023*

### [Pulsedive Lookup Using MSTICpy](https://fr0gger.github.io/jupyter-collection/pulsedive_lookup/PulsediveLookup.html)
This notebook demonstrates how to use MSTICpy to query Pulsedive.

*Published: 10 March 2023*

### [ELK Threat Hunting](https://fr0gger.github.io/jupyter-collection/ELK_Threat_Hunting/ELK_Threat_Hunting.html)
This notebook demonstrates how to connect to an ElasticSearch instance to retrieve the data and analyse them. The dataset used here is from MalwareBazaar.

*Published: 10 September 2022*

### [Malware Bazaar Lookup Using MSTICpy](https://fr0gger.github.io/jupyter-collection/mblookup/MBLookup.html)
This notebook demonstrates how to use MSTICpy to query the Malware Bazaar database.

*Published: 12 August 2022*

### [10 Python Libs for Malware Analysis and Reverse Engineering](https://fr0gger.github.io/jupyter-collection/10_pythonlib_for_RE/10_Python_Lib_for_Re_.html)
This notebook demonstrates 10 python libraries useful for malware analysis and reverse engineering.

*Published: 08 June 2022*

### [Conti Leaks Analysis](https://fr0gger.github.io/jupyter-collection/Conti_Leaks_Analysis/Conti_Leaks_Notebook_TR.html)
This notebook demonstrates a simple way to analyze the Conti Leaks chat logs using Python and [msticpy](https://msticpy.readthedocs.io/en/latest/). It proposes a methodology for threat researchers and allows to extract relevant information using Python and visualization.

*Published: 02 June 2022*

### [VT Domain Hunting using MSTICpy](https://fr0gger.github.io/jupyter-collection/vt_domain_hunting/VT_Domain_hunting.html)
Notebook to hunt for domains relationship using [msticpy](https://msticpy.readthedocs.io/en/latest/).

*Published: 19 May 2022*

### [IoCExtractor using MSTICpy](https://fr0gger.github.io/jupyter-collection/iocextractor/IOCExtractor_.html)
POC to extract Indicator of Compromised from url using [msticpy](https://msticpy.readthedocs.io/en/latest/).

*Published: 31 March 2022*

### [Strings Similarity Experimentation](https://fr0gger.github.io/jupyter-collection/strings_similarity/Strings_Extraction.html)
This notebook shows some experiementation with strings similarity using Jaccard distance, hashing and visualization.

*Published: 25 July 2020*

# Support or Contact

You can contact me on Twitter: [@fr0gger_](https://twitter.com/fr0gger_)