☆16Jan 5, 2017Updated 9 years ago
Alternatives and similar repositories for Machine-Learning-and-Cyber-Security-Resources
Users that are interested in Machine-Learning-and-Cyber-Security-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- Machine Learning for Cyber Security☆30Dec 14, 2021Updated 4 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 4 months ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Metagenomics Pipeline Repository for January, 2015 NCBI/ADDS Hackathon at NIH☆10Oct 31, 2016Updated 9 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆203Jan 18, 2023Updated 3 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- A list of cybersecurity projects that use machine learning techniques☆71Nov 9, 2016Updated 9 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 10 years ago
- Processing software that works with the Arduino Pulse Sensor Amped module. Displays heart rate variation data in graphical format.☆10Mar 15, 2016Updated 10 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of cyber security and "AI" relevant topics☆73Jan 1, 2018Updated 8 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- PCB files for the Adafruit Feather nRF52840 Sense☆14Jan 24, 2024Updated 2 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- Security Analytics UoM - COMP90073 - S2 2020☆10Oct 1, 2021Updated 4 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- A curated list for interpretable machine learning☆18Jan 4, 2019Updated 7 years ago
- An application written in Go that scrapes Colruyt's API to retrieve all product listings.☆28Oct 25, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆21Jan 2, 2026Updated 4 months ago
- My mobile writeups repository☆30Nov 19, 2025Updated 5 months ago
- Tuffy, a Markov Logic Network solver☆26Nov 21, 2014Updated 11 years ago
- Machine Learning Applications in Wireless Communications - Project work☆31May 12, 2019Updated 6 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 7 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 7 years ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Sep 4, 2022Updated 3 years ago
- Deterministic Regular Expressions with Backreferences☆21Oct 12, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated 2 months ago
- ☆14Mar 7, 2015Updated 11 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago