eastmountyxz / When-AI-meet-SecurityView external linksLinks
当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~
☆19May 20, 2024Updated last year
Alternatives and similar repositories for When-AI-meet-Security
Users that are interested in When-AI-meet-Security are comparing it to the libraries listed below
Sorting:
- 该资源为作者AI安全相关论文的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆33Jan 9, 2025Updated last year
- ☆24Aug 15, 2020Updated 5 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- 该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!☆21May 4, 2022Updated 3 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 3 years ago
- 该资源为《软件安全》课程实验及工具,包括PE文件解析、数字签名解析、恶意软件分析、CVE漏洞复现等。希望对您有所帮助~☆79May 21, 2021Updated 4 years ago
- 紫菜鱼的网络安全扫描器☆11Dec 19, 2023Updated 2 years ago
- This contains 100 days of the notes which i have learned with the internship.☆17Dec 1, 2024Updated last year
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆219Apr 30, 2024Updated last year
- collect some exploit traffic pcap☆92Mar 2, 2025Updated 11 months ago
- Tool chains of EasyBC☆10Jun 18, 2024Updated last year
- 驱动开发工具包☆11Dec 8, 2018Updated 7 years ago
- Impacket is a collection of Python classes for working with network protocols.☆11Jul 5, 2023Updated 2 years ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆79Aug 3, 2025Updated 6 months ago
- 国内外一些好用的SRC漏洞挖掘经验、知识、思路、工具分享。☆54Dec 14, 2025Updated 2 months ago
- ☆17Jun 16, 2025Updated 8 months ago
- ☆10Mar 31, 2022Updated 3 years ago
- 使用biaffine的中文命名实体识别☆10Jan 12, 2023Updated 3 years ago
- A white box algorithm that generate adversarial examples according to the gradient☆11May 9, 2020Updated 5 years ago
- Windows 10/11 unsigned kernel driver load/debugging☆17Feb 17, 2023Updated 3 years ago
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- 该资源为杨秀璋作者《Python网络数据爬取及分析从入门到精通(分析篇)》书籍所有源代码,包括可视化分析、聚类分析、回归分析、分类分析、词云和LDA分析等内容。所有代码已修改为Python3实现,希望对您有所帮助,一起加油。☆11Aug 12, 2021Updated 4 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Collection of Windows kernel driver examples, offering insights into Windows internals, rootkit evasion, and advanced driver development.☆11Nov 23, 2023Updated 2 years ago
- Source code for 'Using and Administering Linux: Volume 2' by David Both☆10Dec 23, 2019Updated 6 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- 多线程队列消费work 含有优先级的work 有限流的work可以简易的使用多线程做更多的事情☆11Jul 3, 2024Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 5 months ago
- Easy-to-Hard Learning for Information Extraction (ACL 2023 Findings)☆14Jul 11, 2023Updated 2 years ago
- A low-entropy shellcode executor that encodes shellcode bytes into common English words, with anti-debugging capabilities.☆21Aug 10, 2025Updated 6 months ago
- ☆11Jan 12, 2024Updated 2 years ago
- 欢迎各位关注我们的公众号:摸鱼冲浪研究所☆32Nov 14, 2025Updated 3 months ago
- Windows、Linux持久化套件/Windows, Linux persistence suite☆18May 17, 2024Updated last year
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆14May 15, 2022Updated 3 years ago