Tutorials and video lessons on applying machine learning and deep learning to cybersecurity
☆13Mar 28, 2019Updated 7 years ago
Alternatives and similar repositories for ml-cybersecurity
Users that are interested in ml-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jan 5, 2017Updated 9 years ago
- Neural Networks and TensorFlow☆28Dec 27, 2018Updated 7 years ago
- A simple speech to text (to clipboard) desktop application☆17Apr 27, 2017Updated 8 years ago
- python voice assistant☆16Oct 1, 2020Updated 5 years ago
- Artificial Neural Networks in Python☆25Mar 7, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A REST API built using Node.js and Express.js secured with JSON web tokens and bcrypt hashing.☆11Jan 6, 2023Updated 3 years ago
- 2D Racing game written in Python using Pygame☆19Sep 12, 2017Updated 8 years ago
- Scripts and other stuff.☆133Mar 9, 2026Updated 2 weeks ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Machine Learning Applications in Wireless Communications - Project work☆31May 12, 2019Updated 6 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 6 years ago
- A step-by-step guide to deploy a node application on Heroku.☆26Dec 13, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 7 years ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated last month
- ☆14Mar 7, 2015Updated 11 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- Machine Learning for Healthcare☆10Mar 28, 2020Updated 6 years ago
- Stanford CS234, 2018☆10Mar 23, 2018Updated 8 years ago
- Predict, Manage and Monitor the call drops of cell towers using Cloud Pak for Data☆10Mar 16, 2021Updated 5 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- List of useful resources for AI in medicine - datasets, companies, papers, etc☆10Feb 26, 2018Updated 8 years ago
- Tracing the evolution of AI and large language models from early neural networks to GPT-4 and beyond.☆10Dec 30, 2025Updated 2 months ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- A simple C# program to unhook AMSI and execute unmanaged PowerShell.☆19Sep 2, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- Tutorial for applying machine learning to text data within healthcare☆12May 12, 2023Updated 2 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- Built an activity-aware pulse rate estimation using PPG and Accelerometer sensors.☆10Oct 3, 2021Updated 4 years ago
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- generate informative knowledge graph from text using open source models , ollama☆22Sep 1, 2025Updated 6 months ago