daniel-e / secmlLinks
Security Weaknesses in Machine Learning
☆15Updated last year
Alternatives and similar repositories for secml
Users that are interested in secml are comparing it to the libraries listed below
Sorting:
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- My notes on various topics☆64Updated last year
- An Adaptive Misuse Detection System☆42Updated 8 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 11 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 5 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- ☆13Updated 2 years ago
- Data Scientists Go To Jupyter☆63Updated 4 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Manticore Adversary Emulation Cli☆48Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- OMLASP (Ideas Locas)☆22Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- GCP cloud security CTF☆45Updated 3 weeks ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆40Updated 5 months ago
- A tool for auditing medical devices and healthcare infrastructure☆20Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Central repo for talks and presentations☆46Updated 11 months ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- using ML models for red teaming☆43Updated last year
- ☆10Updated 4 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated last month