☆299Mar 8, 2024Updated last year
Alternatives and similar repositories for book-resources
Users that are interested in book-resources are comparing it to the libraries listed below
Sorting:
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Dec 22, 2016Updated 9 years ago
- ☆93Dec 14, 2018Updated 7 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆372Jan 30, 2023Updated 3 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Jan 24, 2019Updated 7 years ago
- Machine Learning for Cyber Security☆8,151Aug 19, 2024Updated last year
- Hands-on Security Automation in DevOps, published by Packt☆52Jan 30, 2023Updated 3 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,521Oct 1, 2020Updated 5 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆369May 1, 2023Updated 2 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆199Jan 18, 2023Updated 3 years ago
- Source code about machine learning and security.☆2,077Sep 2, 2022Updated 3 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,130Nov 22, 2024Updated last year
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- Malware Data Science Reading Diary / Notes☆130May 5, 2019Updated 6 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Data Hacking Project☆783Mar 5, 2019Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Aug 5, 2025Updated 7 months ago
- An analytical framework for network traffic and behavioral analytics☆456Dec 7, 2022Updated 3 years ago
- Short Course - Applied Machine Learning for Security Informatics☆57Aug 26, 2016Updated 9 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 3 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆184Jan 30, 2023Updated 3 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 8 years ago
- Python for Penetration Testers, published by Packt☆14Jan 30, 2023Updated 3 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- Machine Learning for Computer Security☆280Jan 6, 2022Updated 4 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆814Apr 21, 2023Updated 2 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆29Sep 23, 2025Updated 5 months ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- Ender of Fast-Flux malicious domains.☆26Nov 2, 2014Updated 11 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 7 years ago
- Re-play Security Events☆1,725Mar 20, 2024Updated last year
- ☆26Jul 6, 2023Updated 2 years ago
- This is intended for creating workshops for Kubernetes 101 and 201 and meetups☆14Nov 9, 2019Updated 6 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- Rust gRPC Service Sample☆15Jan 15, 2018Updated 8 years ago
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- 《Web安全之机器学习入门》☆912Aug 29, 2024Updated last year