dtrizna / slpLinks
Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.
☆36Updated 2 weeks ago
Alternatives and similar repositories for slp
Users that are interested in slp are comparing it to the libraries listed below
Sorting:
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- ☆80Updated 6 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆76Updated 2 months ago
- User and Entity Behavior Analytics by deep learning☆117Updated 4 years ago
- ☆16Updated 7 years ago
- ☆13Updated 7 years ago
- Security ML models encoded as Yara rules☆214Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆106Updated last year
- malicious PowerShell script detection model☆42Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆100Updated last month
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 5 years ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆182Updated 6 years ago
- A library for adversarial classifier evasion☆43Updated 11 years ago
- Stringlifier is on Opensource ML Library for detecting random strings in raw text. It can be used in sanitising logs, detecting accidenta…☆169Updated 6 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- ☆110Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆202Updated 2 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆42Updated 7 months ago
- A logic-based enterprise network security analyzer☆133Updated 2 years ago
- Automatic Malware Signature Generation Tool☆16Updated 4 years ago
- Run-time trojan attack on neural networks☆26Updated 6 years ago
- NVD/CVE as JSON files☆122Updated this week
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆173Updated 2 years ago
- GPT-3 use cases for Cybersecurity☆53Updated 2 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago