This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupyter Notebooks and depend on the environment described in the environment.yml file.
☆26Oct 28, 2017Updated 8 years ago
Alternatives and similar repositories for cybersecurity_datascience
Users that are interested in cybersecurity_datascience are comparing it to the libraries listed below
Sorting:
- This project is about tool for detecting, quarantining, and alerting about suspicious phishing emails.☆17Aug 29, 2025Updated 6 months ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- ☆76Mar 24, 2021Updated 4 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- ☆11Feb 9, 2026Updated 3 weeks ago
- Simple TKinter GUI tool written in Python to facilitate some basic audio and video manipulations using ffmpeg☆12Aug 3, 2022Updated 3 years ago
- Animations made by python☆10Jun 19, 2020Updated 5 years ago
- Knowledge Based Authentication Performance Metrics Projec☆12Nov 20, 2014Updated 11 years ago
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆27Updated this week
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- ☆10Dec 26, 2025Updated 2 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- Solutions to Advent of Code 2021 in APL☆11Dec 1, 2022Updated 3 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Brute force Keepass database passwords☆22May 27, 2025Updated 9 months ago
- Bibles Available in XML and other relational Database Formats☆18Mar 11, 2024Updated last year
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- ☆10May 6, 2017Updated 8 years ago
- Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges☆45Jul 31, 2022Updated 3 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Python Remote Administration Tool☆14Jan 8, 2017Updated 9 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 2 weeks ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆55Jan 22, 2023Updated 3 years ago
- ☆13May 17, 2016Updated 9 years ago
- Map-generating tool for the indie game Minecraft, written in Python. NO LONGER DEVELOPED☆33Sep 25, 2010Updated 15 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- ☆13Mar 12, 2022Updated 3 years ago
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- A free Blender addon for placing objects with randomization. You select the assets you want to place and every time you click during the …☆10May 25, 2020Updated 5 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Collection of my scripts☆12Jun 3, 2016Updated 9 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Aug 31, 2016Updated 9 years ago