Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malware and its extent.It deals with the change in network traffic flow.It is developed in Python in Jupyter notebook.
☆13Apr 30, 2020Updated 6 years ago
Alternatives and similar repositories for Automated-Malware-Analysis
Users that are interested in Automated-Malware-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- The Egypt unmanned arial vehicle challange☆15Nov 25, 2021Updated 4 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆27Oct 2, 2020Updated 5 years ago
- This project analyzes PE information of exe files to detect malware. In this repository you will learn how to create your own dataset an…☆14May 11, 2022Updated 3 years ago
- Bruteforce Dictionary Generator☆14Apr 3, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A python implementation for secure file transfer. Course project: "Cyber Security" (KFUPM-COE451)☆17Oct 18, 2021Updated 4 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆77Jan 16, 2023Updated 3 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository provides code source used in the paper: A Mean Field Theory of Quantized Deep Networks: The Quantization-Depth Trade-Off☆13May 30, 2019Updated 6 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- Fast PyQt5 Youtube download application☆11Dec 27, 2024Updated last year
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆76Mar 8, 2019Updated 7 years ago
- Advanced Lane Detection Project which includes advanced image processing to detect lanes irrespective of the road texture, brightness, co…☆14Dec 6, 2018Updated 7 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Nov 26, 2025Updated 5 months ago
- Learn Cyber Security-1 in 30 Days!☆47Jul 11, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Make a Digispark (or teensy) run a python script in the background on any "victim" windows computer you plug it into with python installe…☆18Mar 20, 2023Updated 3 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- QrNX's Hash Tool☆21Feb 1, 2023Updated 3 years ago
- Face Recognition Security☆187Jan 30, 2024Updated 2 years ago
- The Most Powerful Fake Page Redirecting tool...☆55Apr 17, 2022Updated 4 years ago
- Script to extract CNN deep features with different ConvNets, and then use them for an Image Classification task with a SVM classifier wit…☆30May 17, 2018Updated 7 years ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 6 years ago
- 🖥🚀 Web development explained for normal people!☆10Apr 22, 2024Updated 2 years ago
- Simple Digit Recognition OCR in OpenCV☆33Oct 7, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Trello clone GraphQL Node.js backend☆11Aug 23, 2017Updated 8 years ago
- ☆12Sep 9, 2023Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆376Nov 8, 2022Updated 3 years ago
- 本文采用基于注意力机制的卷积神经神经网络模型来实现对阿尔兹海默症疾病的分类。采用3D卷积对图像进行特征获取,通过在卷积中添加注意力机制,重点关注疾病脑图像中的患病区域,从而提高分类模型的实验精度。☆32Jun 15, 2020Updated 5 years ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- Simple Malware Scanner written in python☆90May 10, 2025Updated 11 months ago
- Replacement vphysics module for Garry's Mod☆29May 30, 2012Updated 13 years ago