daniel-e / secmlLinks
Security Weaknesses in Machine Learning
☆15Updated last year
Alternatives and similar repositories for secml
Users that are interested in secml are comparing it to the libraries listed below
Sorting:
- ☆13Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- A collection of resources for security data☆41Updated 7 years ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆20Updated 3 years ago
- An Adaptive Misuse Detection System☆42Updated 7 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Machine learning enabled dropper☆27Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- ☆10Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- My notes on various topics☆64Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- ☆20Updated last year
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Framework for Adversarial Malware Evaluation.☆34Updated 2 months ago
- ☆14Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated last year
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Collection of red machine learning projects☆40Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year