This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupyter Notebooks and depend on the environment described in the environment.yml file.
☆26Oct 28, 2017Updated 8 years ago
Alternatives and similar repositories for cybersecurity_datascience
Users that are interested in cybersecurity_datascience are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- wireless client identification☆18Nov 26, 2014Updated 11 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆23Jul 27, 2020Updated 5 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆75Mar 24, 2021Updated 5 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆24Mar 29, 2020Updated 6 years ago
- ☆68May 13, 2022Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- ☆10May 6, 2017Updated 8 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13May 17, 2016Updated 9 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- Tool (CLI) for using haveibeenpwned through its API (only passwords for now)☆11Apr 26, 2018Updated 7 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- NetCommander - An easy to use arp spoofing tool.☆19Jul 6, 2011Updated 14 years ago
- Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges☆44Jul 31, 2022Updated 3 years ago
- ☆16Dec 16, 2020Updated 5 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Discover "HotSpots" - potential spots for credentials theft☆24Apr 12, 2018Updated 8 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Aug 31, 2016Updated 9 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Packet capture libraries benchmark☆35Jan 31, 2021Updated 5 years ago
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 5 months ago
- small IR scripts for orgs using G Suite☆18Feb 27, 2019Updated 7 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Easy links and guides for DEF CON 28 and 29☆57Aug 5, 2021Updated 4 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 7 years ago
- ☆32Aug 21, 2014Updated 11 years ago
- Lutech TMS EHAT-NG☆14Jul 8, 2017Updated 8 years ago