Machine Learning For Cybersecurity.
☆71Nov 9, 2019Updated 6 years ago
Alternatives and similar repositories for Awesome-ML-Cybersecurity
Users that are interested in Awesome-ML-Cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jan 5, 2017Updated 9 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆375May 1, 2023Updated 3 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆185Jan 30, 2023Updated 3 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of cybersecurity projects that use machine learning techniques☆71Nov 9, 2016Updated 9 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆27Oct 2, 2020Updated 5 years ago
- Machine Learning for Cyber Security☆8,612Aug 19, 2024Updated last year
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 11 months ago
- A repository for MLSecOps and DevSecOps research and more!☆21Feb 20, 2026Updated 2 months ago
- ☆18Sep 13, 2021Updated 4 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆77Jan 16, 2023Updated 3 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities☆42Apr 10, 2024Updated 2 years ago
- Export IDA microcode to BinExport format so that you can use BinDiff to diff microcodes☆12Sep 21, 2024Updated last year
- ☆17May 28, 2022Updated 3 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 6 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆14Apr 9, 2019Updated 7 years ago
- Threat Hunting with Elastic Stack, Published by Packt☆41Apr 22, 2026Updated 2 weeks ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- ☆16Sep 12, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Python library for the ArcSight logger REST API☆27Sep 30, 2021Updated 4 years ago
- Machine Learning for Cyber Security☆49Dec 25, 2019Updated 6 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- Autoencoder approach to detect attacks/intrusions in a network☆10Mar 25, 2023Updated 3 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- datasets from my cyber security research papers☆10Jan 12, 2021Updated 5 years ago
- Method for storing and unsealing Hashicorp Vault using Ansible and Mac Keychain☆14Nov 29, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Learn Cyber Security-1 in 30 Days!☆47Jul 11, 2020Updated 5 years ago
- Udacity AI for Healthcare Nanodegree Projects☆20Jun 27, 2020Updated 5 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,529Oct 1, 2020Updated 5 years ago
- Supercharge your Machine Learning skills with Tensorflow 2☆10Dec 15, 2025Updated 4 months ago
- ☆13Sep 10, 2025Updated 7 months ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago