Collection of Jupyter Notebooks by @fr0gger_

View on GitHub



This repository is a collection of some of my Jupyter Notebook applied to cybersecurity and threat intelligence. If you want to play with the code you can run it here

I-SOON Data Leak Analysis using OCR and Generative AI

This notebook demonstrates how to analyze a data leak in Chinese from PNG files leveraging python, OCR, Translation and Generative AI.
Published: 21 February 2024

Retrieved Augmented Generation (RAG) and ATT&CK

This notebook demonstrates how to construct a Retrieval-Augmented Generation (RAG) model using a Large Language Model (LLM), integrated with the ATT&CK framework, to create your own MITRE assistant powered by LLM.
Published: 03 November 2023

Threat Report Summarization Using LLMs and Few-Shot Learning

This notebook is an experiment designed to demonstrate the application of few-shot learning for summarizing threat reports and generating a mind map of the key findings.
Published: 27 September 2023

Pulsedive Lookup Using MSTICpy

This notebook demonstrates how to use MSTICpy to query Pulsedive.
Published: 10 March 2023

ELK Threat Hunting

This notebook demonstrates how to connect to an ElasticSearch instance to retrieve the data and analyse them. The dataset used here is from MalwareBazaar.
Published: 10 September 2022

Malware Bazaar Lookup Using MSTICpy

This notebook demonstrates how to use MSTICpy to query the Malware Bazaar database.
Published: 12 August 2022

10 Python Libs for Malware Analysis and Reverse Engineering

This notebook demonstrates 10 python libraries useful for malware analysis and reverse engineering.
Published: 08 June 2022

Conti Leaks Analysis

This notebook demonstrates a simple way to analyze the Conti Leaks chat logs using Python and msticpy. It proposes a methodology for threat researchers and allows to extract relevant information using Python and visualization.
Published: 02 June 2022

VT Domain Hunting using MSTICpy

Notebook to hunt for domains relationship using msticpy.
Published: 19 May 2022

IoCExtractor using MSTICpy

POC to extract Indicator of Compromised from url using msticpy.
Published: 31 March 2022

Strings Similarity Experimentation

This notebook shows some experiementation with strings similarity using Jaccard distance, hashing and visualization.
Published: 25 July 2020

Support or Contact

You can contact me on Twitter: @fr0gger_