当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~
☆19May 20, 2024Updated last year
Alternatives and similar repositories for When-AI-meet-Security
Users that are interested in When-AI-meet-Security are comparing it to the libraries listed below
Sorting:
- 该资源为作者AI安全相关论文的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆33Jan 9, 2025Updated last year
- ☆24Aug 15, 2020Updated 5 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- 该资源主要总结AI文本挖掘、知识发现、数据挖掘、图书情报和知识图谱相关论文。重点以国内和国外优秀论文为主,希望能帮助到大家,也欢迎大家补充。☆21Oct 9, 2021Updated 4 years ago
- 该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!☆21May 4, 2022Updated 3 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- 该资源为《软件安全》课程实验及工具,包括PE文件解析、数字签名解析、恶意软件分析、CVE漏洞复现等。希望对您有所帮助~☆79May 21, 2021Updated 4 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆219Apr 30, 2024Updated last year
- collect some exploit traffic pcap☆92Mar 2, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆11Jul 5, 2023Updated 2 years ago
- 驱动开发工具包☆11Dec 8, 2018Updated 7 years ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆80Aug 3, 2025Updated 7 months ago
- ☆10Mar 31, 2022Updated 3 years ago
- 国内外一些好用的SRC漏洞挖掘经验、知识、思路、工具分享。☆55Dec 14, 2025Updated 2 months ago
- 该资源为杨秀璋作者《Python网络数据爬取及分析从入门到精通(分析篇)》书籍所有源代码,包括可视化分析、聚类分析、回归分析、分类分析、词云和LDA分析等内容。所有代码已修改为Python3实现,希望对您有所帮助,一起加油。☆11Aug 12, 2021Updated 4 years ago
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- 使用biaffine的中文命名实体识别☆10Jan 12, 2023Updated 3 years ago
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago
- ☆18Jun 16, 2025Updated 8 months ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- 多线程队列消费work 含有优先级的work 有限流的work可以简易的使用多线程做更多的事情☆11Jul 3, 2024Updated last year
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Source code for 'Using and Administering Linux: Volume 2' by David Both☆10Dec 23, 2019Updated 6 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 6 months ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- ☆11Feb 21, 2022Updated 4 years ago
- 网络安全应急响应信息收集利器 - Eagle_Eye:您的终端信息自动收集专家☆14Jul 11, 2024Updated last year
- XXE漏洞检测 Payload大全☆13Apr 28, 2019Updated 6 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- A low-entropy shellcode executor that encodes shellcode bytes into common English words, with anti-debugging capabilities.☆22Aug 10, 2025Updated 6 months ago
- Windows、Linux持久化套件/Windows, Linux persistence suite☆18May 17, 2024Updated last year
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- 一款命令行fofa查询工具,可快速将查询结果导出到表格中☆13Feb 22, 2024Updated 2 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- ☆14May 30, 2022Updated 3 years ago
- GitHub API Data Gatherer, Supports multi-token rotation, deep fetching, field filtering, and linked requests. Built as a proxy to the off…☆13Jan 5, 2024Updated 2 years ago