Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given url and mail.
☆25May 28, 2022Updated 3 years ago
Alternatives and similar repositories for CyberMachine
Users that are interested in CyberMachine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆62May 18, 2024Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆39Apr 19, 2025Updated last year
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- Includes voluntary work on all abuses related to earthquakes.☆23Mar 31, 2023Updated 3 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Teknokent e-mail address scrapper written in Python using bs4.☆56Mar 20, 2023Updated 3 years ago
- poc or exp of some famous vulnerability☆14Mar 5, 2014Updated 12 years ago
- ☆26Apr 18, 2019Updated 7 years ago
- Implementation of the CTDNE algorithm.☆15Oct 28, 2018Updated 7 years ago
- Implementation of algorithms proposed by [Huang and Kasiviswanathan]☆16Jul 27, 2016Updated 9 years ago
- A deep learning project which uses a method that converts malware .bytes files into gray-scale images and uses a CNN deep learning model …☆37Oct 6, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆42Apr 24, 2023Updated 3 years ago
- ☆16Feb 7, 2023Updated 3 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- ☆15Mar 24, 2023Updated 3 years ago
- 🎨 A simple beautiful LaTeX theme for books, thesis, note.☆23Feb 22, 2022Updated 4 years ago
- ☆16Apr 3, 2020Updated 6 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 4 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- ODSC 2023 workshop materials on causal graphs using implementations of DoWhy (PyWhy, EconML)☆13Nov 1, 2023Updated 2 years ago
- A machine learning malware analysis framework for Android apps.☆138Apr 14, 2024Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- 🐝 Ransomware Detection using Machine Learning with eBPF for Linux.☆75Nov 27, 2024Updated last year
- Trello clone GraphQL Node.js backend☆11Aug 23, 2017Updated 8 years ago
- ☆12Sep 9, 2023Updated 2 years ago
- Machine Learning Data Fairness and Bias☆14Apr 29, 2026Updated last week
- ☆30May 8, 2023Updated 3 years ago
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24May 15, 2020Updated 5 years ago