Security Weaknesses in Machine Learning
☆15Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for secml
Users that are interested in secml are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Crypto messenger via ICMP packets.☆30Dec 13, 2020Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- ☆12Nov 10, 2020Updated 5 years ago
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- ☆13Mar 16, 2021Updated 5 years ago
- LEAP (Learning Edges by Aggregation of Paths)☆12Feb 2, 2024Updated 2 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆17Oct 5, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆15Jan 18, 2025Updated last year
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- Probabilistic Sequence Mining☆46Apr 25, 2018Updated 8 years ago
- The repo for the mobile app of defikarte.ch☆13Apr 10, 2026Updated last month
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆22Mar 20, 2025Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Secure random passwords in Javascript☆14Apr 21, 2024Updated 2 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆18Aug 29, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆14Dec 8, 2022Updated 3 years ago
- ☆14Apr 29, 2019Updated 7 years ago
- academic pages for c2 group☆11Apr 11, 2023Updated 3 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Mar 11, 2019Updated 7 years ago
- In this episode Ben uses the Raspberry Pi Zero to create the smallest Pi portable computer that he has ever made!☆14Jul 4, 2016Updated 9 years ago
- A tiny set of helper scripts for ipinfo☆17Aug 7, 2020Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Dec 29, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PVDM, PVDBOW, doc2vec, sentence2vec, "Distributed Representations of Sentences and Documents ICML'14".☆21May 9, 2018Updated 8 years ago
- MODE: Automated Neural Network Model Debugging via State Differential Analysis and Input Selection - Replication Project☆16Mar 24, 2023Updated 3 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆12Nov 8, 2021Updated 4 years ago
- Spring Security☆11Mar 25, 2019Updated 7 years ago
- LFI (Local File Inclusion) Exploitation Tool☆17Jan 4, 2021Updated 5 years ago