Machine Learning for Computer Security
☆280Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for SecuML
Users that are interested in SecuML are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- mdbook preprocessor for generating checklists and indexes☆14Nov 29, 2022Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Collaborative malware analysis framework☆382Jan 22, 2019Updated 7 years ago
- Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)☆36Aug 17, 2020Updated 5 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82May 18, 2018Updated 7 years ago
- Active Directory Control Paths auditing and graphing tools☆680Dec 17, 2020Updated 5 years ago
- A Python framework for script filing and task sequencing☆26Nov 4, 2019Updated 6 years ago
- Bibliography of stuff I've been reading☆13Nov 1, 2020Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 8 months ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆49Mar 18, 2026Updated last week
- BGP Hijack Detection☆117Feb 14, 2018Updated 8 years ago
- An analytical framework for network traffic and behavioral analytics☆455Dec 7, 2022Updated 3 years ago
- Malware detection tool for Windows PE files based on DFIR ORC data☆11Mar 7, 2026Updated 2 weeks ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- ☆29May 4, 2016Updated 9 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- System for network traffic analysis and anomaly detection.☆92Jul 11, 2025Updated 8 months ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- CardStalker provides a UART-driven smartcard reader at the T=1 (see ISO7816-3) level (link and physical layer), where most of the smartca…☆21May 1, 2022Updated 3 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- Active Directory Group Policy analyzer☆108Apr 10, 2014Updated 11 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- Exploring the network released by the ICIJ from the Panama Papers☆21Jan 22, 2018Updated 8 years ago
- Machine Learning for Cyber Security☆8,315Aug 19, 2024Updated last year
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆280Mar 1, 2023Updated 3 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 11 months ago
- FAME Automates Malware Evaluation☆931Dec 16, 2025Updated 3 months ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago