ByteHackr / Machine-Learning-For-Cyber-SecurityLinks
Machine Learning for Cyber Security
☆30Updated 3 years ago
Alternatives and similar repositories for Machine-Learning-For-Cyber-Security
Users that are interested in Machine-Learning-For-Cyber-Security are comparing it to the libraries listed below
Sorting:
- Mastering Machine Learning for Penetration Testing, published by Packt☆369Updated 2 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 11 months ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- A machine learning approach to detect phishing urls☆28Updated 3 years ago
- A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Fla…☆101Updated last week
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Updated 7 years ago
- ☆46Updated 8 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- A List Of Labs For People (Students) Who Want Learn OR Practice IT Security / Hacking / Penetration Testing In Ethical Way.☆87Updated 4 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 4 years ago
- An Intrusion Detection System written in Python☆27Updated last year
- Checkpot Honeypot Checker☆45Updated 6 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- https://github.com/rshipp/awesome-malware-analysis☆35Updated 4 years ago
- Tools to interact with APTnotes reporting/index.☆104Updated 4 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Tool to predict attacker groups from the techniques and software used☆50Updated 4 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆79Updated 7 years ago
- ToolsWatch and Black Hat Arsenal selection of badges☆56Updated 10 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Perform CVE lookup on cvedetails.com☆25Updated last year
- Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.☆91Updated 5 years ago
- ☆76Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago