drjerry / cve-score
ML research on software vulnerabilities
☆19Updated 5 years ago
Alternatives and similar repositories for cve-score:
Users that are interested in cve-score are comparing it to the libraries listed below
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆152Updated 6 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- SANS Hunting on the Cheap☆35Updated 8 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆142Updated 6 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆51Updated 9 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- DNSDB query scripts☆75Updated 5 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- ☆24Updated 9 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆84Updated 3 weeks ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- ☆138Updated 6 years ago
- ☆16Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated last month
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 8 years ago
- Vulnerability Information Aggregator for CVEs☆119Updated 5 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago