dtrizna / slp
Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.
☆35Updated 5 months ago
Alternatives and similar repositories for slp:
Users that are interested in slp are comparing it to the libraries listed below
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆62Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆81Updated 6 months ago
- ☆21Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆103Updated 9 months ago
- Security ML models encoded as Yara rules☆212Updated last year
- ☆77Updated 5 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆155Updated 2 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆21Updated last year
- NVD/CVE as JSON files☆111Updated last week
- Repository of creating different example suricata data sets☆31Updated 6 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 4 years ago
- ☆74Updated last year
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- SysFlow documentation and issues tracker☆46Updated 4 months ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆84Updated 7 months ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆34Updated last month
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 6 months ago
- Explore Indicators of Compromise Automatically☆94Updated 4 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 6 months ago
- malicious PowerShell script detection model☆36Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Updated 3 years ago
- GPT-3 use cases for Cybersecurity☆52Updated last year
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆176Updated 5 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆70Updated last year
- Yara powered NIDS with high speed packet capture powered by PF_RING☆67Updated 8 months ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 9 months ago