☆300Mar 8, 2024Updated 2 years ago
Alternatives and similar repositories for book-resources
Users that are interested in book-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆93Dec 14, 2018Updated 7 years ago
- Machine Learning for Cyber Security☆8,691Aug 19, 2024Updated last year
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆155Jan 24, 2019Updated 7 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆372Jan 30, 2023Updated 3 years ago
- Machine Learning for Cybersecurity Cookbook, published by Packt☆376May 1, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hands-On Machine Learning for Cybersecurity, published by Packt☆204Jan 18, 2023Updated 3 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,532Oct 1, 2020Updated 5 years ago
- Hands-on Security Automation in DevOps, published by Packt☆52Jan 30, 2023Updated 3 years ago
- OpenSource retweets! - A simple twitter streaming bot to retweet tweets in persian containing link to github or gitlab!☆12Jun 10, 2017Updated 8 years ago
- Malware Data Science Reading Diary / Notes☆130May 5, 2019Updated 7 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 8 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,157Nov 22, 2024Updated last year
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 7 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Apr 4, 2026Updated last month
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆32Sep 23, 2025Updated 7 months ago
- ☆13Jun 19, 2018Updated 7 years ago
- Coburg Intrusion Detection Data Sets☆51Oct 25, 2017Updated 8 years ago
- A drupal module example for crud operations☆15Jan 10, 2017Updated 9 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- Template for building a packet sniffer☆15Mar 25, 2024Updated 2 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- Random snippets based on tensorflow☆10Jan 22, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Short Course - Applied Machine Learning for Security Informatics☆56Aug 26, 2016Updated 9 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Machine Learning Security Principles, published by Packt☆23Apr 22, 2026Updated last month
- ☆270Aug 25, 2018Updated 7 years ago
- An analytical framework for network traffic and behavioral analytics☆458Dec 7, 2022Updated 3 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 7 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- GyoiThon is a growing penetration test tool using Machine Learning.☆816Apr 21, 2023Updated 3 years ago
- ☆21Oct 31, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- ☆141Jun 17, 2020Updated 5 years ago
- Free Malware Training Datasets for Machine Learning☆242Jan 3, 2021Updated 5 years ago
- Open Source Security Events Metadata (OSSEM)☆1,294Feb 27, 2023Updated 3 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 11 years ago
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 5 years ago
- Machine Learning for Computer Security☆280Jan 6, 2022Updated 4 years ago