Machine Learning for Computer Security
☆280Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for SecuML
Users that are interested in SecuML are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- mdbook preprocessor for generating checklists and indexes☆14Nov 29, 2022Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Collaborative malware analysis framework☆382Jan 22, 2019Updated 7 years ago
- Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)☆36Aug 17, 2020Updated 5 years ago
- Inventaire des codes sources des organismes publics (archivé)☆18Jan 24, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python and Machine Learning Workshop at Hack.lu 2017☆82May 18, 2018Updated 7 years ago
- Active Directory Control Paths auditing and graphing tools☆679Dec 17, 2020Updated 5 years ago
- A Python framework for script filing and task sequencing☆26Nov 4, 2019Updated 6 years ago
- Bibliography of stuff I've been reading☆13Nov 1, 2020Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 9 months ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- Malware detection demo using machine learning.☆25Feb 9, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Mar 18, 2026Updated 3 weeks ago
- BGP Hijack Detection☆117Feb 14, 2018Updated 8 years ago
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- Malware detection tool for Windows PE files based on DFIR ORC data☆11Mar 7, 2026Updated last month
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- ☆29May 4, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆16Jan 5, 2017Updated 9 years ago
- System for network traffic analysis and anomaly detection.☆93Jul 11, 2025Updated 9 months ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- CardStalker provides a UART-driven smartcard reader at the T=1 (see ISO7816-3) level (link and physical layer), where most of the smartca…☆21May 1, 2022Updated 3 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Hybrid Isolation Forest☆24Sep 20, 2018Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- Active Directory Group Policy analyzer☆108Apr 10, 2014Updated 12 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploring the network released by the ICIJ from the Panama Papers☆21Jan 22, 2018Updated 8 years ago
- Machine Learning for Cyber Security☆8,410Aug 19, 2024Updated last year
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆281Mar 1, 2023Updated 3 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 11 months ago
- FAME Automates Malware Evaluation☆936Dec 16, 2025Updated 3 months ago