Machine Learning for Cyber Security
☆30Dec 14, 2021Updated 4 years ago
Alternatives and similar repositories for Machine-Learning-For-Cyber-Security
Users that are interested in Machine-Learning-For-Cyber-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jan 5, 2017Updated 9 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 10 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- 泛微OA V8 SQL注入☆10Apr 11, 2021Updated 5 years ago
- modified version of https://automatedhome.party/2017/07/15/wifi-controlled-car-with-a-self-hosted-htmljs-joystick-using-a-wemos-d1-minies…☆12Nov 27, 2017Updated 8 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆13Apr 28, 2023Updated 3 years ago
- ☆13Apr 27, 2018Updated 8 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- ☆52Jul 9, 2013Updated 12 years ago
- Matrix digital rain in P5.JS & Canvas☆11Sep 22, 2019Updated 6 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 2022hw漏洞消息与poc&exp分享☆18Aug 2, 2022Updated 3 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆21Apr 29, 2024Updated 2 years ago
- 泛微OA FileDownloadForOutDoc reception SQL inject 检测利用脚本,EXP,渗透测试,POC☆15Jul 14, 2023Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- MEED: An Unsupervised Multi-Environment Event-Detector for Non-Intrusive Load Monitoring☆10Mar 25, 2023Updated 3 years ago
- 2024年第21届信息安全与对抗技术竞赛 题目附件存档☆22May 23, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 10 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- ☆13Jan 3, 2021Updated 5 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- ☆49Oct 28, 2020Updated 5 years ago
- Journal Article: Telematics and Informatics Reports☆14Jun 18, 2023Updated 2 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Netwo…☆20Feb 26, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- 2023年华中科技大学毕业设计 - 基于溯源图的APT攻击检测方法优化☆21Jun 11, 2023Updated 2 years ago
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 7 years ago
- ☆38Jan 16, 2015Updated 11 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆24May 15, 2018Updated 7 years ago