fabriciojoc / ml-cybersecuritiy-course
Machine Learning applied to Cyber Security Course
☆41Updated 5 years ago
Alternatives and similar repositories for ml-cybersecuritiy-course:
Users that are interested in ml-cybersecuritiy-course are comparing it to the libraries listed below
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆189Updated 2 years ago
- Machine Learning for Phishing Website Detection☆55Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Malware Data Science Reading Diary / Notes☆122Updated 5 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated 11 months ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 months ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆67Updated 2 years ago
- Applied data science in cyber security☆22Updated 2 years ago
- ☆15Updated 8 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆19Updated this week
- My notes on various topics☆64Updated last year
- Malware Bypass Research using Reinforcement Learning☆103Updated 9 months ago
- Definition, description and relationship types of MISP objects☆94Updated last week
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆97Updated 2 weeks ago
- Malware - Machine Learning☆9Updated 6 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- A tool to extract structured cyber information from incident reports.☆79Updated 6 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 4 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆60Updated 2 years ago
- Firepit - STIX Columnar Storage☆16Updated 7 months ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆116Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated last month
- A mapping of used malware names to commonly known family names☆62Updated last year
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆133Updated 4 years ago