dtrizna / slpLinks
Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.
☆36Updated 9 months ago
Alternatives and similar repositories for slp
Users that are interested in slp are comparing it to the libraries listed below
Sorting:
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆67Updated 4 years ago
- ☆79Updated 5 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆22Updated 2 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆40Updated 2 months ago
- ☆35Updated 11 months ago
- Security ML models encoded as Yara rules☆213Updated last year
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆93Updated 11 months ago
- ☆24Updated 4 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆182Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 months ago
- 🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.☆178Updated 6 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆13Updated last month
- ☆15Updated 3 years ago
- ☆77Updated 2 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆95Updated 11 months ago
- User and Entity Behavior Analytics by deep learning☆111Updated 4 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆55Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆16Updated 2 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆51Updated 3 months ago
- ☆98Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆82Updated last year
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆25Updated last year