This page presents our current portfolio of open source software components for cyber security automation. Please click the logos to learn more about each component’s philosophy and access the actual code.
Share sightings and impact information in an aggregated and anonymised form via MISP.
Classify malicious URLs using a joint set of lexicographic and certificate features
Hunt for C2 domains that were generated by DGAs and might facilitate control over criminal botnets.
Generate realistic datasets for training a NIDS by simulating a real infrastructure and real attacks.
Extend Kubernetes and Docker platforms with bio-inspired self-healing properties