☆39Apr 16, 2018Updated 8 years ago
Alternatives and similar repositories for AI-Cyber-Security
Users that are interested in AI-Cyber-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android APK Crawler☆10Nov 8, 2017Updated 8 years ago
- Deep RL agents for NASimEmu. See also https://github.com/jaromiru/NASimEmu.☆15Jul 16, 2024Updated last year
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Resources for private and secure Machine Learning and Artificial Intelligence☆13Jun 13, 2022Updated 3 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- ☆11Mar 17, 2015Updated 11 years ago
- N-Gram Graph: Simple Unsupervised Representation for Graphs, NeurIPS'19 (https://arxiv.org/abs/1806.09206)☆40Apr 14, 2021Updated 5 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- ☆17Mar 29, 2021Updated 5 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆11Jul 22, 2023Updated 2 years ago
- Security evaluation module with onnx, pytorch, and SecML.☆13Apr 9, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An environment for testing AI agents against networks using Metasploit.☆44Feb 4, 2023Updated 3 years ago
- ☆15May 10, 2020Updated 5 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- public database for research☆18Apr 22, 2017Updated 9 years ago
- MLonCode community effort to implement Learning Distributed Representations of Code (https://arxiv.org/pdf/1803.09473.pdf)☆39Oct 18, 2018Updated 7 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- ☆10Mar 2, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12May 6, 2020Updated 6 years ago
- Exploring internet domain names with deep learning using vector embeddings☆19Dec 14, 2018Updated 7 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Limits asset outflows from contracts within customisable timeframes☆11May 7, 2022Updated 4 years ago
- An environment for testing AI pentesting agents against a simulated network.☆206Feb 28, 2024Updated 2 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Nov 6, 2018Updated 7 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- ☆17Nov 11, 2021Updated 4 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- A data analysis project in Python performing sentiment analysis famous leaders' tweets.☆11Jun 8, 2019Updated 6 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆18Sep 12, 2018Updated 7 years ago
- D. E. Shaw Research Technical Reports☆13Jul 4, 2022Updated 3 years ago
- Working examples of KRSI (via BCC scripts).☆15Dec 21, 2020Updated 5 years ago
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Feb 26, 2024Updated 2 years ago