Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malware and its extent.It deals with the change in network traffic flow.It is developed in Python in Jupyter notebook.
☆13Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for Automated-Malware-Analysis
Users that are interested in Automated-Malware-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bruteforce Dictionary Generator☆14Apr 3, 2022Updated 4 years ago
- A python implementation for secure file transfer. Course project: "Cyber Security" (KFUPM-COE451)☆17Oct 18, 2021Updated 4 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course☆16Dec 27, 2020Updated 5 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆76Mar 8, 2019Updated 7 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Nov 26, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Make a Digispark (or teensy) run a python script in the background on any "victim" windows computer you plug it into with python installe…☆18Mar 20, 2023Updated 3 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- Image encryption and embedding encrypted text in the image.☆24Dec 15, 2020Updated 5 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated 2 months ago
- This repository is especially for beginners who want to contribute to Open Source and complete the Hacktoberfest Challenge.☆14Oct 14, 2022Updated 3 years ago
- Trello clone GraphQL Node.js backend☆11Aug 23, 2017Updated 8 years ago
- ☆12Sep 9, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆24Dec 9, 2020Updated 5 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆377Nov 8, 2022Updated 3 years ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Execute commands on Source Engine textmode windows (and otherwise)☆11Feb 22, 2022Updated 4 years ago
- Generates your Github projects in HTML for your (static) website to use from a predefined template.☆12Jan 29, 2021Updated 5 years ago
- A VS Code extension to make GMod addon development easier☆14Aug 26, 2020Updated 5 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago
- Runtime type assertion and serialization system☆15Feb 2, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Coursera Front-End Web UI Frameworks and Tools: Bootstrap 4 Assignments☆21Jan 4, 2020Updated 6 years ago
- This library allows you to track the commits from the facepunch site.☆10Mar 30, 2023Updated 3 years ago
- 🙅♂️ No distractions. No comments sections. No stylesheets. No JavaScript. An HTML-only Reddit client to stop you entering an internet t…☆20Oct 23, 2021Updated 4 years ago
- The ADC Theatre's room booking system☆11Oct 16, 2023Updated 2 years ago
- Tutorial source titles for Source 2☆10May 8, 2021Updated 4 years ago
- ☆11Aug 27, 2022Updated 3 years ago
- The No Comment web application frontend.☆10Jan 25, 2022Updated 4 years ago