Network-Based Malware Detection using Natural Language Processing
☆14May 10, 2021Updated 4 years ago
Alternatives and similar repositories for NLP-Malware
Users that are interested in NLP-Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- malware classify 第三届『阿里云安全算法挑战赛』源码☆16Sep 29, 2018Updated 7 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Parsing PHP source code using Python and generating ASTs☆19Jul 9, 2024Updated last year
- ☆13Apr 25, 2025Updated 10 months ago
- A list of cybersecurity projects that use machine learning techniques☆69Nov 9, 2016Updated 9 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- ☆16Dec 12, 2014Updated 11 years ago
- Tutorials for uisng PyDAAL, i.e. the Python API of Intel Data Analytics Acceleration Library☆11Apr 13, 2018Updated 7 years ago
- API client for Pritunl written in Ruby☆14May 4, 2016Updated 9 years ago
- Generative AI Customer Service Chatbot with MongoDB Atlas and Google Cloud Vertex AI PaLM API☆16Dec 11, 2023Updated 2 years ago
- Collaboration app for sharing and reviewing jupyter notebooks☆16May 25, 2025Updated 9 months ago
- Smart Contract Vulnerability Detection Using Graph Neural Networks☆17Jun 22, 2020Updated 5 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- A tool designed to extract data from a logical ReFS 3.4 forensic image produced by FTK Imager☆16Nov 22, 2023Updated 2 years ago
- A small collection of tools to manage deep learning with multiple sources of loss☆17May 6, 2025Updated 10 months ago
- Repository of benchmarks to evaluate Solidity Smart contract analysis tools☆16Jun 23, 2020Updated 5 years ago
- Silk File Reader☆14Mar 9, 2022Updated 4 years ago
- ☆17Jul 20, 2018Updated 7 years ago
- An awesome list of gas optimization techniques for smart contracts, with their relevant Proof of Concepts tested using Foundry.☆16Mar 2, 2023Updated 3 years ago
- ☆19Jul 9, 2021Updated 4 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- This is the code for the Medium article : In-Browser ML with React.js and ML5.js☆10Oct 17, 2018Updated 7 years ago
- View low level information about NFC tags and their contents, and write your own tags with a dynamic NDEF message editor UI. Qt version f…☆22Jul 22, 2013Updated 12 years ago
- Repository for machine learning tool, MeL, that assist in providing insights for open text data. This tool is part of the 10x Machine Lea…☆13Oct 19, 2023Updated 2 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Web based semantic visualization tool☆12Feb 16, 2017Updated 9 years ago
- ☆16Sep 14, 2020Updated 5 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated last month
- 工具☆18Dec 18, 2017Updated 8 years ago
- A stop-loss liquidity pool to protect against directional risk.☆14Dec 8, 2023Updated 2 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Apr 1, 2023Updated 2 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- A data science enviornment for Ubuntu 14.04 server and desktop☆14Oct 1, 2020Updated 5 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- 视频AI科普教程——视频运动检测☆17Oct 13, 2020Updated 5 years ago
- Python scripts for using mindmup JSON as a medium for developing attack trees☆15Aug 25, 2021Updated 4 years ago
- Simple code converter from pascal to python☆17Mar 11, 2023Updated 3 years ago