☆300Mar 8, 2024Updated 2 years ago
Alternatives and similar repositories for book-resources
Users that are interested in book-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆93Dec 14, 2018Updated 7 years ago
- Machine Learning for Cyber Security☆8,556Aug 19, 2024Updated last year
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆155Jan 24, 2019Updated 7 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆372Jan 30, 2023Updated 3 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆374May 1, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,528Oct 1, 2020Updated 5 years ago
- Source code about machine learning and security.☆2,080Sep 2, 2022Updated 3 years ago
- Hands-on Security Automation in DevOps, published by Packt☆52Jan 30, 2023Updated 3 years ago
- Malware Data Science Reading Diary / Notes☆130May 5, 2019Updated 6 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 7 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,149Nov 22, 2024Updated last year
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆185Jan 30, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 7 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Apr 4, 2026Updated 3 weeks ago
- Data Hacking Project☆784Mar 5, 2019Updated 7 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆31Sep 23, 2025Updated 7 months ago
- ☆13Jun 19, 2018Updated 7 years ago
- Coburg Intrusion Detection Data Sets☆51Oct 25, 2017Updated 8 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Short Course - Applied Machine Learning for Security Informatics☆56Aug 26, 2016Updated 9 years ago
- ☆270Aug 25, 2018Updated 7 years ago
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 10 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆816Apr 21, 2023Updated 3 years ago
- Metasploit for machine learning.☆571Mar 25, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆21Oct 31, 2020Updated 5 years ago
- Re-play Security Events☆1,743Mar 20, 2024Updated 2 years ago
- ☆140Jun 17, 2020Updated 5 years ago
- Free Malware Training Datasets for Machine Learning☆242Jan 3, 2021Updated 5 years ago
- Open Source Security Events Metadata (OSSEM)☆1,293Feb 27, 2023Updated 3 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- A framework for synthesizing lateral movement login data.☆28May 20, 2021Updated 4 years ago