fabriciojoc / ml-cybersecuritiy-course
Machine Learning applied to Cyber Security Course
☆43Updated 5 years ago
Alternatives and similar repositories for ml-cybersecuritiy-course:
Users that are interested in ml-cybersecuritiy-course are comparing it to the libraries listed below
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 7 months ago
- ☆35Updated this week
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Malware Data Science Reading Diary / Notes☆127Updated 5 years ago
- My notes on various topics☆64Updated last year
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- Best practices in threat intelligence☆46Updated 2 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 8 years ago
- ☆33Updated 3 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆71Updated 3 years ago
- A collection of resources for security data☆41Updated 7 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated 11 months ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆32Updated 10 months ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Malware - Machine Learning☆10Updated 7 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆152Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆13Updated 5 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated last month
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago