Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases
☆30Jul 19, 2017Updated 8 years ago
Alternatives and similar repositories for blackhat2017
Users that are interested in blackhat2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14Mar 2, 2021Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- Polyglot detector☆24Jun 5, 2025Updated 10 months ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- The python client of 360 Netlab whois database☆14Dec 5, 2018Updated 7 years ago
- ☆11May 22, 2023Updated 2 years ago
- The official implementation of paper "Drop-Activation: Implicit Parameter Reduction and Harmonious Regularization".☆10May 30, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 7 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- ☆10Jan 4, 2024Updated 2 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Fuzzing tool for DNS Full-Service-Resolvers.☆12Sep 15, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- GitHub API Data Gatherer, Supports multi-token rotation, deep fetching, field filtering, and linked requests. Built as a proxy to the off…☆14Jan 5, 2024Updated 2 years ago
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- Short Course - Applied Machine Learning for Security Informatics☆56Aug 26, 2016Updated 9 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Nov 12, 2022Updated 3 years ago
- High-speed, Load-Distributive Middlebox Detector☆10Oct 31, 2023Updated 2 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23May 4, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Graph clustering and Node embeddings with word2vec☆14Mar 2, 2019Updated 7 years ago
- Spring-Cloud-Spel-RCE☆12Sep 16, 2022Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Fork of https://github.com/elastic/supply-chain-monitor with local AI backend (vLLM/llama.cpp)☆58Apr 2, 2026Updated last week
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago