EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250
☆16Mar 12, 2025Updated last year
Alternatives and similar repositories for eagle-eye
Users that are interested in eagle-eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Nov 22, 2021Updated 4 years ago
- Notifications made easy for backend and frontend developers☆14Dec 8, 2022Updated 3 years ago
- Pseudo random image generator☆12Jul 24, 2019Updated 6 years ago
- Created a Realtime Sentiment Analysis Social Media Monitoring Using Machine Learning and Web Scraping of Any Brand.☆17Feb 28, 2026Updated 3 weeks ago
- Orthrus PIDS (USENIX Sec'25) official code☆34Feb 11, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Implementation of the methods described in our paper "Explicit Planning Helps Language Models in Logical Reasoning"☆23Apr 12, 2023Updated 2 years ago
- ☆32Jul 21, 2025Updated 8 months ago
- Automatic support for (Claude) Skills for any coding agent that supports AGENTS.md☆28Feb 7, 2026Updated last month
- ☆28Jan 30, 2026Updated last month
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- I have made a Mini compact Radar with display for that I have used HC-SR04 ultrasonic sensor, this sensor emit ultrasonic sound which cam…☆16Mar 3, 2019Updated 7 years ago
- ☆19Jul 20, 2025Updated 8 months ago
- annotated dataset of cyber-security related tweets☆22May 10, 2021Updated 4 years ago
- ☆25Dec 4, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hyperledger fabric 1.1 java SDK compatible with android (API 24+)☆15Apr 24, 2018Updated 7 years ago
- Quản Lý Thư Viện sử dụng JSP/Servlet theo mô hình MVC!☆12Mar 16, 2021Updated 5 years ago
- Malware detection using CNN☆12Aug 14, 2018Updated 7 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆26Aug 13, 2021Updated 4 years ago
- A collection of curated instructions and projects rules for your AI-powered IDE tools.☆14Mar 24, 2025Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- PathFinder is a tool designed to visualize call graphs of source code.☆14Dec 3, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The repository is dedicated to Evasion Generative Adversarial Network source code.☆16Jun 9, 2022Updated 3 years ago
- The first part of a 2 part end-to-end devops project that incorportaes gitops practices in building pipelines for continuous integration …☆23Feb 11, 2024Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆23May 17, 2018Updated 7 years ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- Fundamental analog circuit designs to kick start and embark the journey in the world of IC design.☆33Aug 31, 2023Updated 2 years ago
- Channels v3 Multiplerxer☆34Jul 20, 2024Updated last year
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆19Feb 2, 2023Updated 3 years ago
- ☆58Updated this week
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Companion code for "Uncertainty-Driven Active Vision for Implicit Scene Reconstruction". This repository contains the code base for a Nex…☆33Oct 13, 2022Updated 3 years ago
- Run TTPs, with AI!☆115Feb 23, 2026Updated last month
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 3 years ago
- Flow feature extraction tool built in Rust using eBPF☆24Jun 21, 2025Updated 9 months ago