ramizebian / Software-SecurityLinks
Solutions and discussions from the Software Security course on Coursera. Open for collaboration and knowledge sharing.
☆42Updated 4 months ago
Alternatives and similar repositories for Software-Security
Users that are interested in Software-Security are comparing it to the libraries listed below
Sorting:
- Mastering Machine Learning for Penetration Testing, published by Packt☆374Updated 2 years ago
- Software Security course☆23Updated 10 years ago
- Machine Learning For Cybersecurity.☆69Updated 6 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆197Updated 2 years ago
- Detecting malicious URLs using Machine Learning☆30Updated 7 years ago
- Contains Attack labs☆152Updated 6 years ago
- A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Fla…☆106Updated 3 months ago
- Writeups for infosec Capture the Flag events by team Galaxians☆435Updated 2 years ago
- Writeups of CTFLearn Challenges , by EdbR - EladBeber☆15Updated 5 years ago
- detecting phishing websites using machine learning☆45Updated 3 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆49Updated 8 years ago
- ☆55Updated 7 years ago
- Source code for my books☆169Updated 2 years ago
- Vulnerable Python Application To Learn Secure Development☆124Updated last year
- Chrome extension for detecting phishing web sites☆251Updated 5 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- The write-ups for participated CTFs☆63Updated 2 years ago
- Machine Learning for Cyber Security☆30Updated 4 years ago
- ☆16Updated 8 years ago
- Things we learned from Capture The Flag hacking competitions we participated in.☆257Updated 4 years ago
- All CTF events☆75Updated 4 years ago
- Network-Based Malware Detection using Natural Language Processing☆14Updated 4 years ago
- Write-ups for CTF challenges.☆17Updated 4 years ago
- My first trial at Ethical Hacking Write Ups☆23Updated 5 years ago
- In this project, we have detected the malicious URLs using lexical features and boosted machine learning algorithms☆19Updated 5 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆48Updated 2 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆32Updated 3 years ago
- Examples of linear regression, logistic regression, and deep learning implementations such as Transformers, gans, cnns, rnns, and more us…☆99Updated 11 months ago
- Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.☆198Updated 5 years ago