BPNN, SVC, SVR, CART, GSOM, LOF, K_MEANS, GRNN, LR, MLR
☆19Aug 15, 2017Updated 8 years ago
Alternatives and similar repositories for Machine-Learning
Users that are interested in Machine-Learning are comparing it to the libraries listed below
Sorting:
- A collection of Linux Malware Detection projects (research paper implementations) done by me.☆11Jan 6, 2019Updated 7 years ago
- ☆10Jun 2, 2021Updated 4 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- ☆13Jun 15, 2025Updated 8 months ago
- ☆13Jun 19, 2018Updated 7 years ago
- 渗透 超全面的渗透资料💯 包含:0day,xss,sql注入,提权……☆13Jun 22, 2018Updated 7 years ago
- This is where I record the tips, tricks and tools I've accumulated over the years.☆22Nov 24, 2024Updated last year
- ☆20Mar 4, 2023Updated 3 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- ☆32Aug 30, 2019Updated 6 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- RNN implementation with Keras for machine activity data to predict malware☆43Feb 1, 2024Updated 2 years ago
- Graphics, icons, and diagrams to support STIX 2☆48Jun 2, 2021Updated 4 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Oct 6, 2017Updated 8 years ago
- ☆44Nov 30, 2022Updated 3 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆54Aug 23, 2020Updated 5 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- Firstly, we generate images from benign and malware executable files. Secondly, by using deep learning, we train a model to detect malwar…☆73Nov 10, 2019Updated 6 years ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- 非法域名挖掘与画像系统☆80May 24, 2018Updated 7 years ago
- ☆85Dec 6, 2019Updated 6 years ago
- ☆96May 5, 2025Updated 10 months ago
- Codes and models for the CVPR 2017 spotlight paper "Borrowing Treasures from the Wealthy: Deep Transfer Learning through Selective Joint …☆79Jul 18, 2018Updated 7 years ago
- ☆91Mar 9, 2022Updated 4 years ago
- CTF box with most tools installed☆89Aug 22, 2018Updated 7 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆94Nov 1, 2018Updated 7 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 4 years ago
- Windows EoP Bugs☆127Jun 9, 2020Updated 5 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆133Mar 28, 2022Updated 3 years ago
- ☆137Aug 3, 2021Updated 4 years ago
- ☆151Jan 7, 2020Updated 6 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- DNCI - Dot Net Code Injector☆148Jan 11, 2021Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Dec 15, 2023Updated 2 years ago
- exploit for fastjson remote code execution vulnerability☆153Dec 16, 2022Updated 3 years ago