Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given url and mail.
☆25May 28, 2022Updated 3 years ago
Alternatives and similar repositories for CyberMachine
Users that are interested in CyberMachine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source Code for CRC Press book 'Natural Language Processing in the Real World' by Jyotika Singh☆19Jun 23, 2024Updated last year
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆63May 18, 2024Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 11 months ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- ☆14Nov 28, 2023Updated 2 years ago
- Teknokent e-mail address scrapper written in Python using bs4.☆56Mar 20, 2023Updated 3 years ago
- 科研日志模板☆15May 8, 2025Updated 10 months ago
- ☆26Apr 18, 2019Updated 6 years ago
- Implementation of the CTDNE algorithm.☆15Oct 28, 2018Updated 7 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 云梭生产运营管理系统,作为工厂的“智能中枢”,负责精确调度与优化整个生产流程的各个环节。想象一下,一个工厂里有各种各样的机器和工人,他们需要按照一定的顺序和规则来工作,以确保生产出来的产品质量好、效率高。MOM系统就像是这个工厂的“总调度员”,它告诉机器何时开始工作、何时休…☆20Mar 8, 2026Updated 2 weeks ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆36Oct 6, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- ☆16Feb 7, 2023Updated 3 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- A server to receive webhooks for Habitica related projects (github, slack, etc)☆22Feb 7, 2022Updated 4 years ago
- pwk notes and scripts☆14Apr 29, 2015Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆17Apr 3, 2020Updated 5 years ago
- ☆29Apr 1, 2020Updated 5 years ago
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- A bridge between masscan and nmap - run fast masscan, parse output, execute nmap using masscan as input☆31Nov 16, 2025Updated 4 months ago
- A tool to scrape LinkedIn without API restrictions for data reconnaissance☆22Feb 21, 2021Updated 5 years ago
- ☆15Aug 20, 2025Updated 7 months ago
- 🖥🚀 Web development explained for normal people!☆10Apr 22, 2024Updated last year
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- Utilizng an MCP Server to communicate with your C2☆88May 15, 2025Updated 10 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 3 months ago
- ☆21Oct 31, 2020Updated 5 years ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to pr…☆40Feb 17, 2021Updated 5 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- Trello clone GraphQL Node.js backend☆11Aug 23, 2017Updated 8 years ago