ankiteciitkgp / keystrokeDynamicsLinks
☆15Updated 8 years ago
Alternatives and similar repositories for keystrokeDynamics
Users that are interested in keystrokeDynamics are comparing it to the libraries listed below
Sorting:
- Keystroke Dynamics Using LSTMs☆16Updated 7 years ago
- Our project considers various machine learning and deep learning techniques like CNN and RNN based on free-text keystroke features for u…☆14Updated 3 years ago
- Neural Network developed to detect keystroke dynamics.☆11Updated 5 years ago
- Phishing Detection☆66Updated last week
- Cloud Security Automation☆14Updated 5 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Updated 3 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year
- Machine Learning for Phishing Website Detection☆56Updated 5 years ago
- Artificial Intelligence for mass political profiling and covert election interference.☆23Updated 2 years ago
- This project has all the components which you can use to clone yourself over digital channel☆55Updated 5 years ago
- detecting phishing websites using machine learning☆45Updated 3 years ago
- A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Fla…☆106Updated 3 months ago
- Anatomy and Visualization of the Network structure of the Dark web using multi-threaded crawler☆43Updated last year
- Yet another OSINT automator.☆18Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆48Updated 2 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆74Updated 4 years ago
- Curated list of ransomware-related resources; awesome style.☆25Updated 11 months ago
- Machine Learning For Cybersecurity.☆69Updated 6 years ago
- ☆12Updated 2 years ago
- Public Code for ICS Evasion Attack Generation☆44Updated 4 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆80Updated 2 years ago
- a tool that creates permutations of domain names using homographic unicode characters☆21Updated 3 years ago
- Transfer.sh command line program, Now file sharing from the command line is easy.☆13Updated 2 years ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Updated 6 years ago
- Script fingerprinting systems based on shodan.io data☆13Updated 7 years ago
- Python Code to Map Cell Towers From a Cellebrite Android Dump☆56Updated 6 years ago
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆37Updated 5 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago