ThalesGroup / secure-mlLinks
Explore ThalesGroup's comprehensive framework for secure machine learning systems on this repository. Developed by Thales experts, this framework encompasses essential security requirements, guidelines, tools, and privacy recommendations tailored specifically for machine learning applications.
☆15Updated last week
Alternatives and similar repositories for secure-ml
Users that are interested in secure-ml are comparing it to the libraries listed below
Sorting:
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆70Updated last month
- ☆28Updated last week
- Network fuzzer for the modbus protocol☆23Updated 2 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆49Updated last year
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆34Updated last year
- ☆223Updated last week
- ☆16Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated this week
- Network Cryptography Monitor - using eBPF, written in python☆33Updated this week
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated 3 months ago
- Global Security Database Tools☆43Updated last year
- Operational Technology Cyber Attack Database☆49Updated 2 years ago
- Setting up a training environment for MISP☆12Updated 2 years ago
- ☆28Updated 4 years ago
- ☆39Updated 2 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated this week
- ☆39Updated 6 months ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆55Updated last year
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆83Updated this week
- ☆40Updated 6 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆14Updated 2 months ago
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- One Conference 2024☆111Updated 8 months ago
- Share your Yara rules with VirusTotal☆25Updated 10 months ago
- ☆41Updated 3 weeks ago
- ☆104Updated last year
- NOVA: The Prompt Pattern Matching☆121Updated last month
- ☆28Updated 5 months ago