ramizebian / Software-SecurityLinks
Solutions and discussions from the Software Security course on Coursera. Open for collaboration and knowledge sharing.
☆42Updated 5 months ago
Alternatives and similar repositories for Software-Security
Users that are interested in Software-Security are comparing it to the libraries listed below
Sorting:
- Mastering Machine Learning for Penetration Testing, published by Packt☆374Updated 3 years ago
- Machine Learning For Cybersecurity.☆69Updated 6 years ago
- Contains Attack labs☆152Updated 6 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆198Updated 3 years ago
- Detecting malicious URLs using Machine Learning☆30Updated 7 years ago
- A fast, efficient and lightweight (~100 KB) Capture The Flag framework inspired by the HackTheBox platform. Built with Flask.☆110Updated last year
- Writeups/solutions☆100Updated 5 years ago
- Python Penetration Testing Cookbook, published by Packt☆78Updated 3 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆49Updated 9 years ago
- detecting phishing websites using machine learning☆45Updated 3 years ago
- ☆38Updated 7 years ago
- My first trial at Ethical Hacking Write Ups☆23Updated 5 years ago
- Writeups of Capture The Flag Competitions☆123Updated 3 years ago
- ☆76Updated 5 years ago
- Software Security course☆23Updated 10 years ago
- Hands-On Penetration Testing with Python, published by Packt☆84Updated 2 years ago
- Network-Based Malware Detection using Natural Language Processing☆14Updated 4 years ago
- Source code for my books☆171Updated 2 years ago
- ☆16Updated 9 years ago
- Machine Learning for Cyber Security☆30Updated 4 years ago
- Capture the flag challenges☆79Updated 9 months ago
- ☆77Updated 7 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- Writeup for picoCTF 2018☆126Updated 3 years ago
- Midterm Project for the AI & Cybersecurity Course - University of New Haven☆15Updated 5 years ago
- A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Fla…☆108Updated 4 months ago
- Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.☆202Updated 5 years ago
- A collection of resources for security data☆41Updated 8 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Updated 3 years ago
- Write-ups for CTF challenges.☆17Updated 4 years ago