Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/fr0gger/jupyter-collection
Collection of Jupyter Notebooks by @fr0gger_
https://github.com/fr0gger/jupyter-collection
cybersecurity malware-analysis python threat-intelligence
Last synced: 7 days ago
JSON representation
Collection of Jupyter Notebooks by @fr0gger_
- Host: GitHub
- URL: https://github.com/fr0gger/jupyter-collection
- Owner: fr0gger
- License: apache-2.0
- Created: 2022-03-25T06:46:27.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2024-09-02T04:20:17.000Z (5 months ago)
- Last Synced: 2025-01-19T07:08:31.270Z (14 days ago)
- Topics: cybersecurity, malware-analysis, python, threat-intelligence
- Language: HTML
- Homepage: https://jupyter.securitybreak.io
- Size: 5.33 MB
- Stars: 145
- Watchers: 7
- Forks: 31
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
[![Binder](https://mybinder.org/badge_logo.svg)](https://mybinder.org/v2/gh/fr0gger/jupyter-collection.git/HEAD)
# Notebooks
This repository is a collection of some of my Jupyter Notebook applied to cybersecurity and threat intelligence. If you want to play with the code you can run it [here](https://mybinder.org/v2/gh/fr0gger/jupyter-collection.git/HEAD)### [I-SOON Data Leak Analysis using OCR and Generative AI](https://fr0gger.github.io/jupyter-collection/ISOON_DataLeak_OCR_GenAI/ISOON_ChinLeaks.html)
This notebook demonstrates how to analyze a data leak in Chinese from PNG files leveraging python, OCR, Translation and Generative AI.
*Published: 21 February 2024*### [Retrieved Augmented Generation (RAG) and ATT&CK](https://fr0gger.github.io/jupyter-collection/RAG_ATT%26CK/RAG_ATT%26CK.html)
This notebook demonstrates how to construct a Retrieval-Augmented Generation (RAG) model using a Large Language Model (LLM), integrated with the ATT&CK framework, to create your own MITRE assistant powered by LLM.
*Published: 03 November 2023*### [Threat Report Summarization Using LLMs and Few-Shot Learning](https://fr0gger.github.io/jupyter-collection/Threat_Report_Summarization/Threat_Summarization_Few_shot_learning.html)
This notebook is an experiment designed to demonstrate the application of few-shot learning for summarizing threat reports and generating a mind map of the key findings.
*Published: 27 September 2023*### [Pulsedive Lookup Using MSTICpy](https://fr0gger.github.io/jupyter-collection/pulsedive_lookup/PulsediveLookup.html)
This notebook demonstrates how to use MSTICpy to query Pulsedive.
*Published: 10 March 2023*### [ELK Threat Hunting](https://fr0gger.github.io/jupyter-collection/ELK_Threat_Hunting/ELK_Threat_Hunting.html)
This notebook demonstrates how to connect to an ElasticSearch instance to retrieve the data and analyse them. The dataset used here is from MalwareBazaar.
*Published: 10 September 2022*### [Malware Bazaar Lookup Using MSTICpy](https://fr0gger.github.io/jupyter-collection/mblookup/MBLookup.html)
This notebook demonstrates how to use MSTICpy to query the Malware Bazaar database.
*Published: 12 August 2022*### [10 Python Libs for Malware Analysis and Reverse Engineering](https://fr0gger.github.io/jupyter-collection/10_pythonlib_for_RE/10_Python_Lib_for_Re_.html)
This notebook demonstrates 10 python libraries useful for malware analysis and reverse engineering.
*Published: 08 June 2022*### [Conti Leaks Analysis](https://fr0gger.github.io/jupyter-collection/Conti_Leaks_Analysis/Conti_Leaks_Notebook_TR.html)
This notebook demonstrates a simple way to analyze the Conti Leaks chat logs using Python and [msticpy](https://msticpy.readthedocs.io/en/latest/). It proposes a methodology for threat researchers and allows to extract relevant information using Python and visualization.
*Published: 02 June 2022*### [VT Domain Hunting using MSTICpy](https://fr0gger.github.io/jupyter-collection/vt_domain_hunting/VT_Domain_hunting.html)
Notebook to hunt for domains relationship using [msticpy](https://msticpy.readthedocs.io/en/latest/).
*Published: 19 May 2022*### [IoCExtractor using MSTICpy](https://fr0gger.github.io/jupyter-collection/iocextractor/IOCExtractor_.html)
POC to extract Indicator of Compromised from url using [msticpy](https://msticpy.readthedocs.io/en/latest/).
*Published: 31 March 2022*### [Strings Similarity Experimentation](https://fr0gger.github.io/jupyter-collection/strings_similarity/Strings_Extraction.html)
This notebook shows some experiementation with strings similarity using Jaccard distance, hashing and visualization.
*Published: 25 July 2020*# Support or Contact
You can contact me on Twitter: [@fr0gger_](https://twitter.com/fr0gger_)