ByteHackr / Machine-Learning-For-Cyber-SecurityLinks
Machine Learning for Cyber Security
☆30Updated 4 years ago
Alternatives and similar repositories for Machine-Learning-For-Cyber-Security
Users that are interested in Machine-Learning-For-Cyber-Security are comparing it to the libraries listed below
Sorting:
- A machine learning approach to detect phishing urls☆30Updated 3 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆30Updated 3 weeks ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Botnet Simulation Framework☆78Updated 5 years ago
- https://github.com/rshipp/awesome-malware-analysis☆35Updated 5 years ago
- An Intrusion Detection System written in Python☆28Updated 2 years ago
- A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Fla…☆109Updated 4 months ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Updated 8 years ago
- PENIOT: Penetration Testing Tool for IoT☆229Updated 3 years ago
- A collection of resources for security data☆41Updated 8 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- A List Of Labs For People (Students) Who Want Learn OR Practice IT Security / Hacking / Penetration Testing In Ethical Way.☆89Updated 5 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Updated last year
- Tool to predict attacker groups from the techniques and software used☆49Updated 4 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆18Updated 5 years ago
- My notes on various topics☆68Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆81Updated 8 years ago
- ☆46Updated 8 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- ☆79Updated 3 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 7 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Updated 3 years ago
- ☆43Updated last year
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- Tools to interact with APTnotes reporting/index.☆108Updated 5 years ago