Example code for our book Introduction to Artificial Intelligence for Security Professionals
☆154Jan 24, 2019Updated 7 years ago
Alternatives and similar repositories for IntroductionToMachineLearningForSecurityPros
Users that are interested in IntroductionToMachineLearningForSecurityPros are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Short Course - Applied Machine Learning for Security Informatics☆57Aug 26, 2016Updated 9 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- Tools for macOS Forensic Bootable media☆16May 20, 2020Updated 5 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- ☆51Aug 23, 2018Updated 7 years ago
- ☆300Mar 8, 2024Updated 2 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Dec 22, 2016Updated 9 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- Malware Data Science Reading Diary / Notes☆130May 5, 2019Updated 6 years ago
- Open Source Threat Intelligence Chat Bot☆323Mar 30, 2020Updated 5 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- #AISecurity☆1,596Mar 8, 2026Updated 2 weeks ago
- Machine Learning for Cyber Security☆8,315Aug 19, 2024Updated last year
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,524Oct 1, 2020Updated 5 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Mar 25, 2021Updated 4 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- Python bindings for LZFSE☆18Jul 9, 2020Updated 5 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆196Oct 24, 2016Updated 9 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- A taxonomy and dictionary of malware behaviors.☆43Aug 20, 2019Updated 6 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Extension blocks as found in ShellBags and other places in the Registry☆25Jan 7, 2025Updated last year
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Jul 10, 2018Updated 7 years ago
- integration with IDA☆95May 27, 2021Updated 4 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago