daniel-e / secml
Security Weaknesses in Machine Learning
☆15Updated last year
Alternatives and similar repositories for secml:
Users that are interested in secml are comparing it to the libraries listed below
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- ☆24Updated 2 years ago
- ☆14Updated 6 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- ☆13Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Yara rules☆20Updated last year
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆19Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago
- Machine learning enabled dropper☆26Updated last year
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- ☆25Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Collection of red machine learning projects☆39Updated 3 years ago
- An Adaptive Misuse Detection System☆34Updated 2 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated 11 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 9 months ago
- Public rules and samples for various automations through LimaCharlie.io☆11Updated 3 years ago
- ☆10Updated 4 years ago