intel / Resilient-ML-Research-PlatformLinks
☆79Updated 3 years ago
Alternatives and similar repositories for Resilient-ML-Research-Platform
Users that are interested in Resilient-ML-Research-Platform are comparing it to the libraries listed below
Sorting:
- Android Automation Tool☆21Updated 7 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆55Updated 10 years ago
- Automatically exported from code.google.com/p/plcscan☆60Updated 10 years ago
- ☆53Updated 10 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆120Updated 6 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- ANWI - All New Wireless IDS☆29Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Updated 3 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 6 years ago
- defplorex for BlackHat Arsenal☆116Updated 8 years ago
- Pre-OS microcode updater☆43Updated 7 years ago
- ☆42Updated 3 years ago
- malware-traffic-analysis.net PCAPs repository.☆38Updated 9 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- snake - a malware storage zoo☆217Updated 2 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Updated 2 years ago
- A tool for malicious behavior detection in IoT devices☆77Updated 7 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 10 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 7 years ago
- ☆27Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Updated 7 years ago
- Source Code Intelligence☆30Updated 8 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆71Updated 7 years ago