Network-Based Malware Detection using Natural Language Processing
☆14May 10, 2021Updated 4 years ago
Alternatives and similar repositories for NLP-Malware
Users that are interested in NLP-Malware are comparing it to the libraries listed below
Sorting:
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆32Dec 3, 2022Updated 3 years ago
- A list of cybersecurity projects that use machine learning techniques☆69Nov 9, 2016Updated 9 years ago
- CLP Principles by the Liquid Legal Institute☆11Apr 12, 2021Updated 4 years ago
- Code repository for controller, vision, and path planning code for the following simulated mobile robot (http://bit.ly/1bD0sgJ).☆11Apr 7, 2014Updated 11 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- A Google Chrome extension to download Udacity.com videos for offline watching☆40Dec 4, 2013Updated 12 years ago
- Creating crowdsourcing based experiments made easy☆10May 25, 2020Updated 5 years ago
- Fast convolution algorithms with Python types☆10Nov 20, 2016Updated 9 years ago
- The world's most popular free, open source ad serving system☆12Oct 22, 2011Updated 14 years ago
- Analysis pipeline for quick ML analyses.☆11Oct 4, 2018Updated 7 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- Datasets for Drug Discovery and Development☆10Aug 22, 2020Updated 5 years ago
- Very basic Flask example☆10Aug 21, 2019Updated 6 years ago
- ☆10Aug 1, 2018Updated 7 years ago
- 92% gender prediction accuracy based on users' tweets and profile pictures.☆11Feb 1, 2017Updated 9 years ago
- ☆12Oct 7, 2020Updated 5 years ago
- 🎭 Sentiment Analysis with Neural Networks☆10Dec 4, 2016Updated 9 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- ☆10Oct 1, 2020Updated 5 years ago
- A curated list of automated machine learning papers, articles, tutorials, slides and projects☆14Jul 17, 2018Updated 7 years ago
- Przygotowanie i wysyłka plików JPK☆12Feb 19, 2019Updated 7 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- A better visualisation of data.gov.in☆19May 17, 2013Updated 12 years ago
- POS tagging models for Hindi English Code Mixed Tweets☆11Aug 1, 2018Updated 7 years ago
- BitBucket pipelines YAML runner/parser☆13Apr 29, 2017Updated 8 years ago
- flutter WebRTC sample ios app with flutter_ios_voip_kit https://github.com/masashi-sutou/flutter_ios_voip_kit☆13Jul 23, 2020Updated 5 years ago
- Image registration in Matlab using B-Spline-Transformation☆10Apr 30, 2018Updated 7 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- Real-time face-recognition program. Have fun with OpenCV-python.☆12Feb 26, 2021Updated 5 years ago
- Collaboration app for sharing and reviewing jupyter notebooks☆16May 25, 2025Updated 9 months ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- ☆15Dec 8, 2022Updated 3 years ago
- Collection of code without a particular purpose.☆10Jan 13, 2026Updated last month
- Collection of examples with LSTM recurrent neural networks☆11Jul 7, 2017Updated 8 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Some fun programs and snippets I wrote☆15Mar 29, 2017Updated 8 years ago
- Tool for Reconnaissance on a web camera.☆18Apr 5, 2022Updated 3 years ago
- ☆17Feb 6, 2018Updated 8 years ago