☆16Jan 5, 2017Updated 9 years ago
Alternatives and similar repositories for Machine-Learning-and-Cyber-Security-Resources
Users that are interested in Machine-Learning-and-Cyber-Security-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 6 years ago
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- Machine Learning for Cyber Security☆30Dec 14, 2021Updated 4 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 3 months ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A list of cybersecurity projects that use machine learning techniques☆69Nov 9, 2016Updated 9 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Collection of cyber security and "AI" relevant topics☆73Jan 1, 2018Updated 8 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Machine Learning Applications in Wireless Communications - Project work☆31May 12, 2019Updated 6 years ago
- ☆20Jan 2, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 6 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 7 years ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Sep 4, 2022Updated 3 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated last month
- ☆13Feb 14, 2020Updated 6 years ago
- Predict, Manage and Monitor the call drops of cell towers using Cloud Pak for Data☆10Mar 16, 2021Updated 5 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- List of useful resources for AI in medicine - datasets, companies, papers, etc☆10Feb 26, 2018Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Silk File Reader☆14Mar 9, 2022Updated 4 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆223Apr 25, 2024Updated last year
- Security evaluation module with onnx, pytorch, and SecML.☆13Apr 9, 2022Updated 3 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- Tutorial for applying machine learning to text data within healthcare☆12May 12, 2023Updated 2 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Built an activity-aware pulse rate estimation using PPG and Accelerometer sensors.☆10Oct 3, 2021Updated 4 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- A curated list of awesome awesomeness. With repository stars⭐ and forks🍴☆26Updated this week
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- Python scripts for using mindmup JSON as a medium for developing attack trees☆15Aug 25, 2021Updated 4 years ago
- CCIE routing and switching notes and references, with a general directory and specific topic directories.☆26Oct 5, 2021Updated 4 years ago
- Source Code for 'AI for Healthcare with Keras and Tensorflow 2.0' by Anshik Bansal☆15Jul 19, 2021Updated 4 years ago