Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases
☆30Jul 19, 2017Updated 8 years ago
Alternatives and similar repositories for blackhat2017
Users that are interested in blackhat2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Polyglot detector☆23Jun 5, 2025Updated 9 months ago
- The python client of 360 Netlab whois database☆14Dec 5, 2018Updated 7 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Sep 3, 2015Updated 10 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Fuzzing tool for DNS Full-Service-Resolvers.☆12Sep 15, 2025Updated 6 months ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- GitHub API Data Gatherer, Supports multi-token rotation, deep fetching, field filtering, and linked requests. Built as a proxy to the off…☆13Jan 5, 2024Updated 2 years ago
- Scrypture makes it easy to put Python scripts online. Simply add a class to your Python script and Scrypture will automatically serve you…☆11Oct 23, 2019Updated 6 years ago
- DHCP attack tool☆21Oct 4, 2024Updated last year
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- Short Course - Applied Machine Learning for Security Informatics☆57Aug 26, 2016Updated 9 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆47Jul 8, 2019Updated 6 years ago
- Anomaly detection in time-series networks. Spatio-temporal Anomaly Detection☆12Jan 9, 2020Updated 6 years ago
- A "general-purpose" tracing tool☆39Jun 22, 2015Updated 10 years ago
- High-speed, Load-Distributive Middlebox Detector☆10Oct 31, 2023Updated 2 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23May 4, 2016Updated 9 years ago
- Graph clustering and Node embeddings with word2vec☆14Mar 2, 2019Updated 7 years ago
- Spring-Cloud-Spel-RCE☆12Sep 16, 2022Updated 3 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Jul 6, 2023Updated 2 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago