gau820827 / Ransome-killerView external linksLinks
This is the project on ransomeware detection using machine learning.
☆25Dec 29, 2016Updated 9 years ago
Alternatives and similar repositories for Ransome-killer
Users that are interested in Ransome-killer are comparing it to the libraries listed below
Sorting:
- Ransomware Detection using Machine Learning☆11Feb 10, 2023Updated 3 years ago
- Ransomware Detection using Machine Learning Models and Ensemble Technique☆35Aug 8, 2024Updated last year
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆48Apr 15, 2023Updated 2 years ago
- The most up-to-date list of Turkish ads to block ads on Turkish websites☆19Dec 12, 2025Updated 2 months ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 2 months ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 2 months ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- ODSC 2023 workshop materials on causal graphs using implementations of DoWhy (PyWhy, EconML)☆13Nov 1, 2023Updated 2 years ago
- Cybersecurity Internship Project☆113Jun 18, 2022Updated 3 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆10Jul 18, 2021Updated 4 years ago
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- Learn LangChain for Genearative AI with OpenAI API using Python☆11Feb 15, 2024Updated 2 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- Machine learning based credit risk prediction system☆27Nov 18, 2025Updated 2 months ago
- In todays era, due to the surge in the usage of internet and other online platforms, security has been a major concern. Many cyber attack…☆11Apr 11, 2021Updated 4 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- ☆11Jan 5, 2021Updated 5 years ago
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- ☆14Jun 13, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Share secrets encrypted☆14Feb 3, 2026Updated last week
- ☆12May 10, 2023Updated 2 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- R Data Mining, published by Packt☆13Jan 30, 2023Updated 3 years ago
- Türkçe Sahte Kişi/Kimlik/İsim Oluşturucu☆15Nov 10, 2020Updated 5 years ago
- ☆15Aug 20, 2025Updated 5 months ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago
- 📘 This repo is full of sample functions to learn common C programming routines. From string operations to math, file I/O to array manipu…☆10May 1, 2024Updated last year
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆11Aug 23, 2021Updated 4 years ago
- ☆13Feb 27, 2025Updated 11 months ago
- DDoS attack analysis using Machine Learning☆47Aug 15, 2020Updated 5 years ago
- This repo contains Lyra AI's work in the E-Commerce Hackathon organized by Trendyol and Teknofest.☆13Nov 6, 2024Updated last year
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- Machine Learning Data Fairness and Bias☆13Jun 14, 2025Updated 8 months ago
- Tired of not working tools for brute force? I was too, now we all have a fully working tool, this little fire brute forces multible socia…☆11Sep 3, 2022Updated 3 years ago
- ☆14Jan 15, 2023Updated 3 years ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago