Security Weaknesses in Machine Learning
☆15Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for secml
Users that are interested in secml are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Nov 10, 2020Updated 5 years ago
- We are a Swiss Capture The Flag team. We participate in CTFs and publish write-ups on CTF tasks.☆10Mar 25, 2019Updated 7 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Apr 14, 2026Updated 2 weeks ago
- ☆11Apr 2, 2021Updated 5 years ago
- Pytorch implementation of XGNN☆10Jan 20, 2021Updated 5 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- ALFASVMLib - A Matlab library for adversarial label flip attacks against SVMs☆13Jun 19, 2015Updated 10 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- ☆13Mar 16, 2021Updated 5 years ago
- Subgraph-augmented Path Embedding for Semantic User Search on Heterogeneous Social Network☆13Feb 19, 2018Updated 8 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Large-Scale Sequence Mining with Hierarchies☆13Mar 13, 2015Updated 11 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆17Oct 5, 2024Updated last year
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- ☆16May 27, 2021Updated 4 years ago
- Probabilistic Sequence Mining☆46Apr 25, 2018Updated 8 years ago
- The repo for the mobile app of defikarte.ch☆13Apr 10, 2026Updated 2 weeks ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆22Mar 20, 2025Updated last year
- Secure random passwords in Javascript☆14Apr 21, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A small WinRM client designed for interacting with JEA endpoints.☆15Aug 29, 2024Updated last year
- ☆21Nov 6, 2025Updated 5 months ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆13Mar 1, 2024Updated 2 years ago
- academic pages for c2 group☆11Apr 11, 2023Updated 3 years ago
- AWS managed IAM policies☆16Mar 24, 2022Updated 4 years ago
- Python decoder for ACARS messages, roughly inspired by wireshark☆14Mar 26, 2019Updated 7 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆15Feb 14, 2017Updated 9 years ago