当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~
☆19May 20, 2024Updated last year
Alternatives and similar repositories for When-AI-meet-Security
Users that are interested in When-AI-meet-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Aug 15, 2020Updated 5 years ago
- ☆25Dec 10, 2022Updated 3 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- 漏洞盒子入驻企业列表爬虫☆14Jan 18, 2019Updated 7 years ago
- 使用biaffine的中文命名实体识别☆10Jan 12, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!☆21May 4, 2022Updated 3 years ago
- 该资源为作者AI安全相关论文的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆32Jan 9, 2025Updated last year
- 收集了人工智能在网络安全领域的比赛、应用案例和博客。☆22Feb 21, 2020Updated 6 years ago
- 2021 CCF BDCI 数字安全公开赛“基于人工智能的恶意软件家族分类”赛题第二名Petrichor战队解决方案☆21Jan 24, 2022Updated 4 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆223Apr 30, 2024Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- Re-ranking task using MS MARCO dataset and Hugging Face library☆15Jun 7, 2020Updated 5 years ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆82Aug 3, 2025Updated 8 months ago
- 人岗匹配模型,采用 dssm方法和deepffm实现☆11Jul 26, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 驱动开发工具包☆11Dec 8, 2018Updated 7 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆29Apr 12, 2024Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13Jul 5, 2023Updated 2 years ago
- ☆17Jun 16, 2025Updated 10 months ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆32Jan 26, 2024Updated 2 years ago
- Windows 10/11 unsigned kernel driver load/debugging☆19Feb 17, 2023Updated 3 years ago
- ☆12Apr 6, 2023Updated 3 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- A low-entropy shellcode executor that encodes shellcode bytes into common English words, with anti-debugging capabilities.☆22Aug 10, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- suricata rules to pcap☆10Mar 25, 2021Updated 5 years ago
- Easy-to-Hard Learning for Information Extraction (ACL 2023 Findings)☆14Jul 11, 2023Updated 2 years ago
- collect some exploit traffic pcap☆93Mar 2, 2025Updated last year
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- 该资源为《软件安全》课程实验及工具,包括PE文件解析、数字签名解析、恶意软件分析、CVE漏洞复现等。希望对您有所帮助~☆79May 21, 2021Updated 4 years ago
- Source code for 'Using and Administering Linux: Volume 2' by David Both☆10Dec 23, 2019Updated 6 years ago
- Collection of Windows kernel driver examples, offering insights into Windows internals, rootkit evasion, and advanced driver development.☆13Nov 23, 2023Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Jul 19, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆17Nov 24, 2020Updated 5 years ago
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- 在原本BERT-BILSTM-CRF上融合GCN和词性标签等做NER任务☆26Mar 9, 2021Updated 5 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- Source code for NAACL 2022 paper: Relation-Specific Attentions over Entity Mentions for Enhanced Document-Level Relation Extraction☆17May 9, 2022Updated 3 years ago
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- 通过分析流量,快速检查手机是否被APT攻击☆35Oct 19, 2025Updated 6 months ago