Collection of cyber security and "AI" relevant topics
☆73Jan 1, 2018Updated 8 years ago
Alternatives and similar repositories for cyber-matrix-ai
Users that are interested in cyber-matrix-ai are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jan 5, 2017Updated 9 years ago
- Detecting malicious URLs using an autoencoder neural network☆42Oct 9, 2022Updated 3 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- Detecting malicious URLs using Machine Learning☆29Oct 30, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Docker install for edex-ui☆20Jun 7, 2019Updated 6 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆276Aug 12, 2022Updated 3 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing so…☆13Updated this week
- Malware Machine Learning☆27Apr 1, 2018Updated 8 years ago
- ☆12May 2, 2025Updated 11 months ago
- Machine Learning Models to Detect and Classify Malicious URLs☆55Feb 19, 2023Updated 3 years ago
- Malicious Web Sites Detection using Suspicious URL☆76Oct 2, 2020Updated 5 years ago
- AI: Deep Learning for Phishing URL Detection☆57Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🚨 Slack bot for cyber-security phishing☆21Jan 22, 2019Updated 7 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- With WWW being the global platform, various fields inclusive to the same have emerged until hitherto. Due to ever-changing forms of cyber…☆15Jun 9, 2021Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Template repo to quickly create new Github repos with Builds, CI/CD, Linting, Security Scanning, Pre-commit, Direnv, and lots of cool Bad…☆25Feb 3, 2026Updated 2 months ago
- A collection of prompts for people that want to learn more about cybersecurity topics.☆16Mar 31, 2023Updated 3 years ago
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repository☆19Jan 1, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Provide a GUI desktop experience for Athena OS in Windows Subsystem for Linux (WSL 2).☆14Feb 6, 2025Updated last year
- Extracting features from URLs to build a data set for machine learning. The purpose is to find a machine learning model to predict phishi…☆60Jun 1, 2021Updated 4 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Command line interface (CLI) to install Kali Linux Tools in your desired distribution.☆11May 27, 2022Updated 3 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 7 years ago
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- eXpose deep neural network, detects malicious URLs, file paths and registry keys with proper training☆47Feb 13, 2018Updated 8 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- ☆11May 10, 2018Updated 7 years ago
- ☆12May 10, 2023Updated 2 years ago
- Builds Vircadia's native Interface and Domain server ("Project Athena") on Linux.☆21Jun 7, 2023Updated 2 years ago
- Configurations for a vertical 72" PiWall system☆13Jan 21, 2017Updated 9 years ago