jivoi / awesome-ml-for-cybersecurityView external linksLinks
Machine Learning for Cyber Security
☆8,104Aug 19, 2024Updated last year
Alternatives and similar repositories for awesome-ml-for-cybersecurity
Users that are interested in awesome-ml-for-cybersecurity are comparing it to the libraries listed below
Sorting:
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,517Oct 1, 2020Updated 5 years ago
- #AISecurity☆1,567Aug 21, 2025Updated 5 months ago
- Defund the Police.☆13,426Jun 7, 2024Updated last year
- A curated list of Awesome Threat Intelligence resources☆9,786Jan 19, 2026Updated 3 weeks ago
- Source code about machine learning and security.☆2,071Sep 2, 2022Updated 3 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,891May 15, 2023Updated 2 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,133Jul 15, 2024Updated last year
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,742Apr 3, 2024Updated last year
- A curated list of tools for incident response☆8,808Jul 18, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆13,976Jan 11, 2026Updated last month
- A curated list of amazingly awesome Cybersecurity datasets☆1,918Mar 2, 2024Updated last year
- an awesome list of honeypot resources☆10,146Apr 1, 2025Updated 10 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- A collection of awesome penetration testing resources, tools and other shiny things☆25,238Jan 25, 2026Updated 3 weeks ago
- List of Awesome Red Teaming Resources☆7,757Dec 28, 2023Updated 2 years ago
- ✍️ A curated list of CVE PoCs.☆3,474Jan 4, 2022Updated 4 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,646Jan 1, 2024Updated 2 years ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- 🐶 A curated list of Web Security materials and resources.☆13,078May 2, 2025Updated 9 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,245Jul 22, 2024Updated last year
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,496Jan 5, 2026Updated last month
- Data Hacking Project☆784Mar 5, 2019Updated 6 years ago
- A collected list of awesome security talks☆4,194Apr 9, 2021Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,570Feb 9, 2026Updated last week
- A curated list of amazingly awesome OSINT☆24,753Feb 4, 2026Updated last week
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,895Oct 20, 2025Updated 3 months ago
- 安全场景、基于AI的安全算法和安全数据分析业界实践☆1,748Jul 28, 2021Updated 4 years ago
- A curated list of awesome infosec courses and training resources.☆5,579Nov 21, 2025Updated 2 months ago
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,714Sep 13, 2023Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,115Sep 29, 2025Updated 4 months ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆106,598Jan 18, 2025Updated last year
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,307Dec 7, 2020Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,440Oct 1, 2025Updated 4 months ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,059Jul 31, 2024Updated last year
- A curated list of awesome YARA rules, tools, and people.☆4,134Mar 26, 2025Updated 10 months ago
- A collection of sources of indicators of compromise.☆947May 8, 2025Updated 9 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,135Feb 2, 2026Updated 2 weeks ago
- 自身学习的安全数据科学和算法的学习资料☆635Jul 26, 2020Updated 5 years ago
- Automated Adversary Emulation Platform☆6,733Feb 9, 2026Updated last week