å°åçµæ¸åæã·ã¹ãã ï¼RESASï¼ãªã¼ãµã¹ï¼ã¯ãå°æ¹åµçã®æ§ã ãªåãçµã¿ãæ å ±é¢ããæ¯æ´ããããã«ãçµæ¸ç£æ¥çã¨å é£å®æ¿æ°ããå°æ¹çµæ¸ã»çæ´»ç°å¢åµçæ¬é¨äºåå±ãæä¾ãããå°åã®äººå£ãç£æ¥æ§é ã人æµãäºæ¥æç«å°ãPOSãªã©å®æ°ã®ããã°ãã¼ã¿ãå¯è¦åããã·ã¹ãã ã§ãã
ä¹å·æ¯ç¤¾ã§æè¡ãªãµã¼ãããã¸ãã¹éçºãªã©ã®æ¥åãè¡ã£ã¦ãã¾ããå°æ£ã好ãã§ãæ£åã¯ã¦ã©ã¼ãºäºæ®µãããã§ãã ä»åã¯åç·¨ã®ç¶ãã§ãã åç·¨ã§ã¯ãElasticsearchã®ç´¹ä»ãæå¸«ãã¼ã¿ã®ä½æãè¡ãã¾ããã åç·¨ï¼Elasticsearchã®æ©æ¢°å¦ç¿åæã«ããé¡ä¼¼ãã¡ã¤ã³æ¤ç¥ ãã®å¾ç·¨ã§ã¯ã使ããæå¸«ãã¼ã¿ã使ã£ã¦ãå®éã«Elasticsearchã®æ©æ¢°å¦ç¿æ©è½ã使ã£ãåæãè¡ã£ã¦ããã¾ãã Elasticsearchã®æºå ããã±ã¼ã¸ã®ã¤ã³ã¹ãã¼ã« ã¾ã㯠Elasticsearch㨠WebUIã® Kibanaãã¤ã³ã¹ãã¼ã«ãã¾ãã以ä¸ã®ãµã¤ãããææ°çã®ããã±ã¼ã¸ããã¦ã³ãã¼ããã¦ãã ããã [Download Elasticsearch] [Download Kibana] ä»å使ç¨ãã¦ããOS㯠Debianã§ãããããã±ã¼ã¸ã¯ãã㦠DEBçã使ãã Linux x86_64
Good Data Analysis Stay organized with collections Save and categorize content based on your preferences. outlined_flag Large-scale data analysis requires careful consideration of distributions, outliers, noise, and practical significance to ensure accurate and meaningful insights. The process should be divided into distinct stages: validation, description, and evaluation, and involve thorough und
A site for sharing packet capture (pcap) files and malware samples. Traffic Analysis Exercises: Click here -- for training exercises to analyze pcap files of network traffic. Â Â Click here -- for some tutorials and workshop material that will help for these exercises. My Blog Posts: [2013] - [2014] - [2015] - [2016] - [2017] - [2018] - [2019] - [2020] - [2021] - [2022] - [2023] - [2024] - [2025]
A curated list of awesome malware analysis tools and resources. Inspired by awesome-python and awesome-php. Malware CollectionAnonymizersHoneypotsMalware CorporaOpen Source Threat IntelligenceToolsOther ResourcesDetection and ClassificationOnline Scanners and SandboxesDomain AnalysisBrowser MalwareDocuments and ShellcodeFile CarvingDeobfuscationDebugging and Reverse EngineeringNetworkMemory Forens
Introduction In this study, we analyzed how long phishing pages survive as well as the signs they show when they become inactive. In addition to the general data, we provided a number of options for classifying phishing pages according to formal criteria and analyzed the results for each of them. The resulting data and conclusions could be used to improve mechanisms for re-scanning pages which hav
This application is built to scale out and to speed up the retrieval of threat info. It provides: Enrichment of Threat Intel for files as well as observables (IP, Domain, URL, hash, etc). A Fully-fledged REST APIs written in Django and Python. An easy way to be integrated in your stack of security tools to automate common jobs usually performed, for instance, by SOC analysts manually. (Thanks to t
æ¬è¨äºã¯ã仿¥ããã§ãããµã¤ãã¼è å¨ã¤ã³ããªã¸ã§ã³ã¹ã®è©±-å°å ¥ç·¨-ãã®ç¶ãã§ãããå ·ä½çãªãµã¤ãã¼è 卿 å ±ã®åéæ¹æ³ããã©ãããã©ã¼ã ã«ã¤ãã¦ç´¹ä»ããè¨äºã§ãã ããµã¤ãã¼è å¨ã¤ã³ããªã¸ã§ã³ã¹ã£ã¦ä½?ãã¨ããæ¹ãããã£ãããã°åã®è¨äºãåèã«ãã¦ãã ããã Let's CTI ç§ãå人ã¬ãã«ã§ãã£ã¦ãã CTI ã®æ´»åãåé¡ãã¦ã¿ãã¨ã以ä¸ã®3ã¤ã®æ¹æ³ã«ãªãã¨æãã¾ãã ç¡æã§å©ç¨ã§ããã¤ã³ããªã¸ã§ã³ã¹ãµã¼ãã¹ã»ãã¼ã¿ãã¼ã¹ãæ´»ç¨ãã ãªã³ã©ã¤ã³ãµã³ãããã¯ã¹ãæ´»ç¨ãã SNS ãå¤é¨ã®ã³ãã¥ããã£ãå©ç¨ãã ããããé·æãã«ãã¼ã§ããé åãç°ãªãã®ã§ãèªåã®èå³ãçµç¹ã® CTI ã®ç®çã«åããã¦ã©ã®æ¹æ³ãåãã¹ããæ¤è¨ãã¦ã¿ãã¨è¯ãã§ãããã ã§ã¯ã詳細ã«èª¬æãã¦ããã¾ãã 1. ç¡æã§å©ç¨ã§ããã¤ã³ããªã¸ã§ã³ã¹ãµã¼ãã¹ã»ãã¼ã¿ãã¼ã¹ãæ´»ç¨ãã ä¸ã®ä¸ã«ã¯åªç§ãªã¤ã³ããªã¸ã§ã³ã¹åæè ãã
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãç¥ãã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}