Biprodeep / awesome-ml-for-cybersecurityLinks
Machine Learning for Cyber Security
☆27Updated 8 years ago
Alternatives and similar repositories for awesome-ml-for-cybersecurity
Users that are interested in awesome-ml-for-cybersecurity are comparing it to the libraries listed below
Sorting:
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆52Updated 8 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- ☆100Updated 3 years ago
- A Browser Fuzzer for Vulnerbilities☆66Updated 10 years ago
- Xuanwu Lab Blog☆90Updated 6 years ago
- ☆90Updated 4 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Updated 8 years ago
- A fork of AFL for fuzzing Windows binaries☆23Updated 7 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Updated 8 years ago
- ☆49Updated 6 years ago
- fuzz☆125Updated 10 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- Web&Browser Security☆43Updated 2 years ago
- A web page based fuzzer that generates random JS statements then fuzz in the web-browser.☆60Updated 6 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- ☆99Updated 7 years ago
- The FTP fuzzer for Sulley and Peach.☆54Updated 11 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- ☆164Updated 7 years ago
- Learn binary exploitation from angelboy's hitcon-training☆37Updated 7 years ago
- Browser Fuzzing Framework ,浏览器Fuzzing 框架..☆31Updated 9 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Updated 8 years ago
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆65Updated 8 years ago
- wooyun_articles fork from☆19Updated 8 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Updated 3 years ago
- Automatically exported from code.google.com/p/it-sec-catalog,new version: https://it-sec-catalog.info/.☆39Updated 10 years ago
- The unofficial release of the tool we used in the EuroS&P 2017 paper: Open Doors for Bob and Mallory: Open Port Usage in Android Apps and…☆23Updated 7 years ago
- CVE-2017-13089☆55Updated 7 years ago