incertum / cyber-matrix-aiView external linksLinks
Collection of cyber security and "AI" relevant topics
☆73Jan 1, 2018Updated 8 years ago
Alternatives and similar repositories for cyber-matrix-ai
Users that are interested in cyber-matrix-ai are comparing it to the libraries listed below
Sorting:
- Malicious URL detector using keras recurrent networks and scikit-learn classifiers☆36Feb 26, 2018Updated 7 years ago
- A Dataset for the task of Malicious URL Detection☆20Jan 18, 2018Updated 8 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- Docker install for edex-ui☆20Jun 7, 2019Updated 6 years ago
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆19Aug 19, 2020Updated 5 years ago
- Detecting malicious URLs using Machine Learning☆29Oct 30, 2018Updated 7 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆133Jun 13, 2021Updated 4 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Experiments to detect phishing websites using neural networks☆23Nov 24, 2019Updated 6 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆273Aug 12, 2022Updated 3 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated 2 weeks ago
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Detecting malicious URLs using an autoencoder neural network☆42Oct 9, 2022Updated 3 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- ☆52Sep 5, 2018Updated 7 years ago
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 2 years ago
- Code and templates required to build the DARPA open catalog.☆17Mar 23, 2016Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Command line interface (CLI) to install Kali Linux Tools in your desired distribution.☆11May 27, 2022Updated 3 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing so…☆13Updated this week
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Black Pro Dashboard For Laravel Framework 11.x and Up☆12May 27, 2024Updated last year
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- Template repo to quickly create new Github repos with Builds, CI/CD, Linting, Security Scanning, Pre-commit, Direnv, and lots of cool Bad…☆26Feb 3, 2026Updated last week
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 2 months ago