alexantoniogonzalez2 / cyberattack-detectionView external linksLinks
Machine learning based cyber attack detection in network traffic.
☆14Dec 14, 2020Updated 5 years ago
Alternatives and similar repositories for cyberattack-detection
Users that are interested in cyberattack-detection are comparing it to the libraries listed below
Sorting:
- The codebase for an AI-Based detection system to detect False Data Injection Attacks (FDIA) – the most sophisticated and damaging attack …☆28Aug 29, 2021Updated 4 years ago
- MATMTDC is a free open source Matlab based program for performing dynamic analysis of AC/DC hybrid power systems. It is inspired by MatPo…☆12May 4, 2021Updated 4 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- This is a CNN model for prediction of cyber attack, trained using NSL-KDD dataset☆10Mar 7, 2024Updated last year
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- A Novel Unsupervised Data-Driven Method for Electricity Theft Detection in AMI Using Observer Meters☆14Sep 5, 2025Updated 5 months ago
- ☆19Sep 24, 2025Updated 4 months ago
- ML framework for anomaly detection in the state estimation of the power system☆22Dec 7, 2022Updated 3 years ago
- metasploit module for the CVE-2025-24071☆26Mar 18, 2025Updated 10 months ago
- ☆24Nov 9, 2020Updated 5 years ago
- simulate centralized and distributed power grid, in order to implement state estimation and bad data detection. Also, simplest FDI Attack…☆23May 9, 2020Updated 5 years ago
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 4 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Sep 25, 2020Updated 5 years ago
- ☆31Mar 2, 2018Updated 7 years ago
- The implementation of CDW_FedAvg in the paper "Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT"☆33Jun 5, 2021Updated 4 years ago
- [Tool] Low rank matrix recovery by minimizing matrix norm☆47Jun 8, 2020Updated 5 years ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆47Sep 24, 2022Updated 3 years ago
- This repository host code of my NLP playlist here - https://www.youtube.com/playlist?list=PL3N9eeOlCrP6zMkHMxFJV4yXIsET5aWlc☆47Sep 28, 2020Updated 5 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Sep 19, 2020Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆75Apr 3, 2021Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆183Mar 14, 2025Updated 11 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆271Apr 17, 2023Updated 2 years ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆293Sep 6, 2024Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆395Mar 20, 2025Updated 10 months ago
- ☆426Feb 11, 2023Updated 3 years ago
- Machine Learning Projects and Learning Content☆472Jan 21, 2024Updated 2 years ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆513Jan 2, 2025Updated last year
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆562Aug 6, 2025Updated 6 months ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- All-in-One Toolkit for BruteForce Attacks☆1,049Sep 28, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,470Jan 23, 2026Updated 3 weeks ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,755May 22, 2024Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,816Aug 20, 2025Updated 5 months ago
- Learn how to process, classify, cluster, summarize, understand syntax, semantics and sentiment of text data with the power of Python! Thi…☆1,692Dec 24, 2020Updated 5 years ago
- Practice and tutorial-style notebooks covering wide variety of machine learning techniques☆3,295May 22, 2023Updated 2 years ago
- Pytorch Implementation of DQN / DDQN / Prioritized replay/ noisy networks/ distributional values/ Rainbow/ hierarchical RL☆3,159Nov 4, 2021Updated 4 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,891May 15, 2023Updated 2 years ago