intel / Resilient-ML-Research-PlatformLinks
☆80Updated 2 years ago
Alternatives and similar repositories for Resilient-ML-Research-Platform
Users that are interested in Resilient-ML-Research-Platform are comparing it to the libraries listed below
Sorting:
- Android Automation Tool☆21Updated 7 years ago
- ANWI - All New Wireless IDS☆29Updated 6 years ago
- ☆52Updated 10 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 10 months ago
- Pre-OS microcode updater☆43Updated 6 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆51Updated 9 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 9 years ago
- ☆42Updated 2 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆40Updated 2 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- defplorex for BlackHat Arsenal☆116Updated 7 years ago
- A tool for malicious behavior detection in IoT devices☆76Updated 6 years ago
- malware-traffic-analysis.net PCAPs repository.☆36Updated 8 years ago
- Automatically exported from code.google.com/p/plcscan☆58Updated 10 years ago
- Platform Firmware Auditing Tool☆130Updated 6 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆53Updated 9 years ago
- Snort rules☆35Updated 6 years ago
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- Process HTTP Pcaps With YARA☆103Updated 11 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- snake - a malware storage zoo☆216Updated last year