☆51Aug 23, 2018Updated 7 years ago
Alternatives and similar repositories for MachineLearning
Users that are interested in MachineLearning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- ☆10Nov 19, 2015Updated 10 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆155Jan 24, 2019Updated 7 years ago
- Bro Detection Scripts☆10Mar 9, 2021Updated 5 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Ansible playbooks to build an ELK dashboard for OpenWRT☆10Aug 4, 2017Updated 8 years ago
- A tool for detecting sensitive data in code repositories☆18Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Treck Network Stack Discovery Tool [Ripple20]☆12Jul 1, 2020Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆133May 1, 2015Updated 11 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- ☆18Dec 20, 2024Updated last year
- ELK roles & profiles with Puppet☆14Feb 28, 2020Updated 6 years ago
- Swachalit - The null automation platform that hosts null.co.in.☆21Dec 10, 2024Updated last year
- DHCP attack tool☆22Oct 4, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- setup zeek, previously Bro IDS☆18Apr 21, 2026Updated last week
- Full pipeline for log analysis and anomaly detection.☆18Feb 11, 2020Updated 6 years ago
- Three datasets to practice Threat Hunting against.☆47Jan 3, 2024Updated 2 years ago
- ☆27Jul 1, 2016Updated 9 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A set of Zeek scripts to detect ATT&CK techniques.☆621Jun 26, 2024Updated last year
- DNS Dashboard for hunting and identifying beaconing☆17Jul 29, 2020Updated 5 years ago
- Short Course - Applied Machine Learning for Security Informatics☆56Aug 26, 2016Updated 9 years ago
- Slides and code for "Validating Models in R" Strata 2016 RDay http://conferences.oreilly.com/strata/hadoop-big-data-ca/public/schedule/de…☆10Jun 22, 2020Updated 5 years ago
- Slides, Code, and Exercises to support [R Quickstart tutorial](http://conferences.oreilly.com/strata/hadoop-big-data-ca/public/schedule/d…☆10Mar 25, 2016Updated 10 years ago
- ☆11Apr 17, 2017Updated 9 years ago
- Network Forensics Bro scripts & pcap samples☆63Mar 11, 2014Updated 12 years ago