daniel-e / secml
Security Weaknesses in Machine Learning
☆15Updated last year
Related projects: ⓘ
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆33Updated last month
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- ☆13Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 3 months ago
- Botnet Simulation Framework☆75Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆47Updated 4 years ago
- A collection of resources for security data☆39Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆36Updated 2 months ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Framework for Adversarial Malware Evaluation.☆32Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆24Updated 3 years ago
- ☆18Updated 3 years ago
- My notes on various topics☆64Updated 11 months ago
- A Python 3 library to interact with VirusShare API v2.☆13Updated 4 years ago
- Malware Machine Learning☆27Updated 6 years ago
- Automated Yara Rule generation using Biclustering☆58Updated 3 years ago
- ☆16Updated 6 years ago
- DGA detection project that aims to rapidly build and deploy a machine learning system to detect domain names generated by malware.☆14Updated 5 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆56Updated 4 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆11Updated 2 years ago
- a Machine Learning powered CSRF attacks finding tool☆24Updated 5 years ago
- ☆14Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 4 months ago
- Run-time trojan attack on neural networks☆25Updated 5 years ago
- Machine learning enabled dropper☆24Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago