Applied data science in cyber security
☆23Mar 21, 2022Updated 4 years ago
Alternatives and similar repositories for Hanhan_CyberSecurity_DataScience
Users that are interested in Hanhan_CyberSecurity_DataScience are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Short Course - Applied Machine Learning for Security Informatics☆57Aug 26, 2016Updated 9 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- This repository holds the implementation for the time-decaying in-network heavy-hitter detection algorithm, dSketch, proposed in the pape…☆10Jul 28, 2021Updated 4 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated last month
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Custom Black arch based docker container for continuous automated red teaming☆24Jan 21, 2026Updated 2 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- DDoS attack analysis using Machine Learning☆47Aug 15, 2020Updated 5 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Feb 15, 2022Updated 4 years ago
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated last week
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Unofficial P4_16 implementation of the HashPipe heavy hitter detection algorithm proposed in the paper, "Heavy-Hitter Detection Entirely …☆19Jun 5, 2020Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆42Jan 31, 2025Updated last year
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- 💳 ETL (Extract, Transform and Load) pipeline for calculating stats for a transactions database & testing the efficacy of a loyalty prog…☆10Apr 25, 2017Updated 8 years ago
- Modeling methods of System Dynamics – Supply Chain Simulation using the Anylogic software☆10Jan 8, 2026Updated 2 months ago
- CS234 Project, Winter 2019☆10Mar 20, 2019Updated 7 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- a fuzzy expert system for auto-tuning PID algorithm☆12Mar 6, 2019Updated 7 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 4 months ago
- Tutorial for setting up an Ethereum private chain, sending transactions, and doing smart contracts ...☆10Feb 22, 2022Updated 4 years ago
- 🚀 Lightweight Python library for building production LLM applications with smart context management and automatic token optimization. Sa…☆36Dec 23, 2025Updated 3 months ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- The resources stored in this repository cover data science topics applied to cybersecurity environments.☆25Jun 26, 2020Updated 5 years ago
- DC Motor Tuning Using Fuzzy Logic And PID Controller☆11Oct 8, 2020Updated 5 years ago
- Basic Ethereum Oracle example, using Provable, Truffle, Vue and Web3☆21Feb 11, 2019Updated 7 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 3 months ago
- Predicting Supply Chain Risks Using Machine Learning: The Trade-off Between Performance and Interpretability - Supplementary Material☆14Mar 8, 2019Updated 7 years ago