This repository is a collection of some of my Jupyter Notebook applied to cybersecurity and threat intelligence. If you want to play with the code you can run it here
This notebook demonstrates how to construct a Retrieval-Augmented Generation (RAG) model using a Large Language Model (LLM), integrated with the ATT&CK framework, to create your own MITRE assistant powered by LLM.
Published: 03 November 2023
This notebook is an experiment designed to demonstrate the application of few-shot learning for summarizing threat reports and generating a mind map of the key findings.
Published: 27 September 2023
This notebook demonstrates how to use MSTICpy to query Pulsedive.
Published: 10 March 2023
This notebook demonstrates how to connect to an ElasticSearch instance to retrieve the data and analyse them. The dataset used here is from MalwareBazaar.
Published: 10 September 2022
This notebook demonstrates how to use MSTICpy to query the Malware Bazaar database.
Published: 12 August 2022
This notebook demonstrates 10 python libraries useful for malware analysis and reverse engineering.
Published: 08 June 2022
This notebook demonstrates a simple way to analyze the Conti Leaks chat logs using Python and msticpy. It proposes a methodology for threat researchers and allows to extract relevant information using Python and visualization.
Published: 02 June 2022
Notebook to hunt for domains relationship using msticpy.
Published: 19 May 2022
POC to extract Indicator of Compromised from url using msticpy.
Published: 31 March 2022
This notebook shows some experiementation with strings similarity using Jaccard distance, hashing and visualization.
Published: 25 July 2020
Support or Contact
You can contact me on Twitter: @fr0gger_