Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malware and its extent.It deals with the change in network traffic flow.It is developed in Python in Jupyter notebook.
☆13Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for Automated-Malware-Analysis
Users that are interested in Automated-Malware-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- This project analyzes PE information of exe files to detect malware. In this repository you will learn how to create your own dataset an…☆13May 11, 2022Updated 3 years ago
- A python implementation for secure file transfer. Course project: "Cyber Security" (KFUPM-COE451)☆16Oct 18, 2021Updated 4 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆76Jan 16, 2023Updated 3 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- Use Ros, Wecar lane Detection and Yolo Object Detection(Bus Stop) with my friends☆11Oct 24, 2020Updated 5 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- A Multi-modal Framework for Sentimental Analysis of Meme☆17Jan 29, 2021Updated 5 years ago
- This repository provides code source used in the paper: A Mean Field Theory of Quantized Deep Networks: The Quantization-Depth Trade-Off☆13May 30, 2019Updated 6 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- High-Performance Face Recognition Framework (models trained on MS1MV2) | In PyTorch >> ONNX Runtime Inference☆20Feb 13, 2026Updated last month
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- ROS node for lane detection based on computer vision algorithms☆18Oct 17, 2019Updated 6 years ago
- This algorithm is integrated with anvil website which identifies the alphabet present in the given input image.☆12Jul 9, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Self-driving RC Car ROS Software☆19Mar 19, 2018Updated 8 years ago
- Explanation of All the Payloads Used in Pentester Academy's JS for Pentester Course☆16Dec 27, 2020Updated 5 years ago
- Browse the web entirely over SMS — no apps required.☆13Oct 6, 2014Updated 11 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 7 years ago
- End-to-end autonomous vehicle capable of sensing, perception, planning & control.☆17Mar 25, 2023Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Nov 26, 2025Updated 3 months ago
- My Leetcode Journey☆14Aug 29, 2022Updated 3 years ago
- QrNX's Hash Tool☆20Feb 1, 2023Updated 3 years ago
- Learn Cyber Security-1 in 30 Days!☆47Jul 11, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- Social Scraper is a python tool meant for Detection of Child Predators/Cyber Harassers on Social Media☆62Sep 3, 2020Updated 5 years ago
- Collection of cyber security and "AI" relevant topics☆73Jan 1, 2018Updated 8 years ago
- voting using blockchain technology☆11Apr 8, 2023Updated 2 years ago
- Face Recognition Security☆185Jan 30, 2024Updated 2 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- The Most Powerful Fake Page Redirecting tool...☆55Apr 17, 2022Updated 3 years ago