Applied data science in cyber security
☆23Mar 21, 2022Updated 4 years ago
Alternatives and similar repositories for Hanhan_CyberSecurity_DataScience
Users that are interested in Hanhan_CyberSecurity_DataScience are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- This repository holds the implementation for the time-decaying in-network heavy-hitter detection algorithm, dSketch, proposed in the pape…☆10Jul 28, 2021Updated 4 years ago
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated 3 months ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Custom Black arch based docker container for continuous automated red teaming☆24Jan 21, 2026Updated 3 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- DDoS attack analysis using Machine Learning☆47Aug 15, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆13Jun 19, 2018Updated 7 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆22Feb 15, 2022Updated 4 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆27Jul 1, 2016Updated 9 years ago
- Unofficial P4_16 implementation of the HashPipe heavy hitter detection algorithm proposed in the paper, "Heavy-Hitter Detection Entirely …☆19Jun 5, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆43Jan 31, 2025Updated last year
- Decentralised Energy Market☆12Feb 19, 2018Updated 8 years ago
- Calculate the number of nuclear reactors needed for the energy wasted by cryptocurrency mining☆11Mar 8, 2025Updated last year
- Attempt to reproduce paper for crack inspection in nuclear plants from video footage.(see references).☆14Dec 19, 2019Updated 6 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Modeling methods of System Dynamics – Supply Chain Simulation using the Anylogic software☆10Jan 8, 2026Updated 3 months ago
- Powerful infrastructure development tool based on Ansible☆20Updated this week
- CS234 Project, Winter 2019☆10Mar 20, 2019Updated 7 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- a fuzzy expert system for auto-tuning PID algorithm☆12Mar 6, 2019Updated 7 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- This uses HydroSphere to expose a Python machine learning preventive maintenance model for truck brake maintenance☆17Jan 23, 2026Updated 3 months ago
- ☆14Sep 28, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆59Jan 16, 2023Updated 3 years ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 6 months ago