adobe / tripod
Tripod is a tool/ML model for computing latent representations for large sequences
☆16Updated 5 months ago
Related projects: ⓘ
- ☆30Updated 6 years ago
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 4 years ago
- As seen at DEF CON and O'Reilly Live Trainings☆21Updated 10 months ago
- Data Feed Manager (news watch orchestrator to predict topic with deepdetect and store cleaned text in elasticsearch)☆40Updated last year
- Redis Security Map - Anti-hacking for Redis☆32Updated 2 years ago
- ☆33Updated 7 years ago
- Identifies phishing websites using a treebag model☆22Updated 3 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- ML research on software vulnerabilities☆20Updated 5 years ago
- Graph database version of the CVE database☆23Updated last year
- Opsec considerations for each AWS GuardDuty finding type.☆22Updated 3 years ago
- My notes on various topics☆64Updated 11 months ago
- ☆66Updated this week
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- Salesforce Policy Deviation Checker☆29Updated 3 years ago
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- ☆32Updated 6 years ago
- Automatic log parser to support forensic analysis☆9Updated 5 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆20Updated last year
- ☆25Updated this week
- Detect Sensitive REST API communication using Deep Neural Networks☆46Updated last year
- ☆17Updated this week
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 2 years ago
- 🏖️ Generates a TL;DR of news using Natural Language Processing 🏖️☆36Updated 3 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 6 years ago
- ☆30Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆74Updated 2 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆18Updated 3 years ago
- Normalizer for honeypot data.☆11Updated 9 months ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 5 years ago