Applied data science in cyber security
☆23Mar 21, 2022Updated 4 years ago
Alternatives and similar repositories for Hanhan_CyberSecurity_DataScience
Users that are interested in Hanhan_CyberSecurity_DataScience are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 8 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23May 13, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 months ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆22Feb 15, 2022Updated 4 years ago
- Security Blogs - A simple aggregator for security news/blog☆28May 16, 2026Updated last week
- Checklist of the most important security countermeasures when designing, testing, and releasing your API☆10Jan 22, 2022Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆43Jan 31, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆13May 27, 2020Updated 5 years ago
- Attempt to reproduce paper for crack inspection in nuclear plants from video footage.(see references).☆14Dec 19, 2019Updated 6 years ago
- 💳 ETL (Extract, Transform and Load) pipeline for calculating stats for a transactions database & testing the efficacy of a loyalty prog…☆10Apr 25, 2017Updated 9 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- a fuzzy expert system for auto-tuning PID algorithm☆12Mar 6, 2019Updated 7 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆18Oct 22, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆60Jan 16, 2023Updated 3 years ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- DOMIAS, a density-based MIA model that aims to infer membership by targeting local overfitting of the generative model.☆12May 29, 2023Updated 2 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- Evolutionary Game Theory Simulator☆11Jun 8, 2018Updated 7 years ago
- Blackhat 2025 presentation and codebase: AI SOC agent & MCP server for automated security investigation, alert triage, and incident respo…☆30Dec 28, 2025Updated 4 months ago
- Basic Ethereum Oracle example, using Provable, Truffle, Vue and Web3☆21Feb 11, 2019Updated 7 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Predicting Supply Chain Risks Using Machine Learning: The Trade-off Between Performance and Interpretability - Supplementary Material☆14Mar 8, 2019Updated 7 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Multivariate Electricity Consumption Prediction with Extreme Learning Machine☆10Jun 25, 2018Updated 7 years ago
- Classifing the iris dataset with fuzzy logic, genetic algorithm and particle swarm optimization.☆10Nov 15, 2019Updated 6 years ago
- A demo using Zokrates to build an encrypted transaction on Ethereum/Qtum based on zkSNARKs algorithm☆15Oct 16, 2019Updated 6 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- Offensive Security & Red Teaming Labs and Projects☆27Aug 26, 2025Updated 8 months ago