fabriciojoc / ml-cybersecuritiy-courseView external linksLinks
Machine Learning applied to Cyber Security Course
☆49Sep 5, 2019Updated 6 years ago
Alternatives and similar repositories for ml-cybersecuritiy-course
Users that are interested in ml-cybersecuritiy-course are comparing it to the libraries listed below
Sorting:
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- ☆19Mar 31, 2019Updated 6 years ago
- Repositório do Livro Emulando Redes sem Fio com Mininet-WiFi☆14Jul 23, 2021Updated 4 years ago
- A golang opinionated library to provide reliable request using hystrix-go, go-cache, and go-resiliency.☆14Aug 28, 2020Updated 5 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- ☆20Oct 16, 2019Updated 6 years ago
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Mar 11, 2017Updated 8 years ago
- A Study on the Effectivity of Jailbreak Detection in Banking Apps (EuroS&P 2019)☆22Apr 25, 2020Updated 5 years ago
- ☆26Jun 11, 2018Updated 7 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- GRPC full stack application demo ( Backend/ Cli / Android / iOS / Web )☆24Aug 24, 2024Updated last year
- Create mmdb files to encode prefix lists.☆31Sep 25, 2024Updated last year
- JVM Introspection Utilities☆28Jan 26, 2026Updated 3 weeks ago
- 💠 Step-by-step guide of a custom and universal setup for plain VPSs or bare-metal servers using free and open tools.☆29May 8, 2019Updated 6 years ago
- Object Mapper for DynamoDB☆58Jul 5, 2025Updated 7 months ago
- Azure Function App to serve as midddleware for a logon script solution for cloud managed devices.☆15Apr 25, 2023Updated 2 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Nov 3, 2025Updated 3 months ago
- Automate AWS with the CLI and shell scripting!☆33Aug 7, 2021Updated 4 years ago
- ☆36Jun 15, 2020Updated 5 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- A Python library to help with some common threat hunting data analysis operations☆141Apr 23, 2023Updated 2 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- A set asynchronous, non-blocking & parallelism problems to challenge your mind!☆36Jun 2, 2025Updated 8 months ago
- 📚 The Bayes Way 🎓☆33Dec 3, 2022Updated 3 years ago
- Um curso de terraform totalmente em português brasileiro☆35Mar 17, 2021Updated 4 years ago
- Clojure graph library built on top of Titan☆106Jan 2, 2016Updated 10 years ago
- Manage Jira assets in your code or CLI☆13Feb 3, 2026Updated 2 weeks ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Helper library to test error cases with Cassandra db☆10Jul 27, 2017Updated 8 years ago
- Elastic Ingest Documentation☆14Updated this week
- 🍛 TypeScript Options-object Currying☆13Dec 9, 2019Updated 6 years ago
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- o diário oficial do século XXI☆35Dec 23, 2017Updated 8 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Imagem Docker para o programa Carnê-Leão (Receita Federal, IRPF)☆35Apr 17, 2019Updated 6 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago