dtrizna / slp
Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.
☆36Updated 7 months ago
Alternatives and similar repositories for slp:
Users that are interested in slp are comparing it to the libraries listed below
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆67Updated 3 years ago
- malicious PowerShell script detection model☆38Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆104Updated 11 months ago
- ☆15Updated 3 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 4 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 8 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆86Updated 8 months ago
- ☆77Updated 5 years ago
- Security ML models encoded as Yara rules☆215Updated last year
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 11 months ago
- ☆21Updated 3 years ago
- Pytorch implementation of MalConv☆72Updated 3 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Updated 4 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆44Updated 2 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- User and Entity Behavior Analytics by deep learning☆108Updated 4 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆39Updated last month
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆76Updated 2 years ago
- GPT-3 use cases for Cybersecurity☆52Updated last year
- ☆16Updated 7 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆22Updated last year
- NVD/CVE as JSON files☆114Updated last week
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- ☆33Updated 8 months ago
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆22Updated last year
- ☆76Updated 2 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago