roshanlam / ML_CyberSecurity
Machine Learning for Cyber Security
☆48Updated 5 years ago
Alternatives and similar repositories for ML_CyberSecurity:
Users that are interested in ML_CyberSecurity are comparing it to the libraries listed below
- A tool to spider Github or search URLs for various information leaks☆33Updated last year
- A tool to extract useful data from documents☆155Updated 2 months ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆70Updated last year
- A repository for cybersecurity students☆40Updated 11 months ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆114Updated 7 months ago
- ☆57Updated 5 years ago
- Updated incident response generator for training classes☆43Updated 3 years ago
- Violent Python scripts used in book and few other required files☆1Updated 5 years ago
- ☆64Updated 4 years ago
- Script to generate a combined PDF for the Security Engineering 3rd edition book from the publicly available chapters under review.☆35Updated 3 months ago
- Modular web-application honeypot platform built using go and gin☆55Updated 9 months ago
- ☆14Updated 3 years ago
- The only open-source tool to analyze vulnerabilities and configuration issues with running docker container(s) and docker networks.☆127Updated 2 years ago
- ☆21Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 4 years ago
- A simple CLI to create your resume and personal website based on your LinkedIn profile or a JSON file☆112Updated 3 years ago
- ☆93Updated 2 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆26Updated 5 years ago
- Repository demonstrating the Capital One breach on your AWS account☆241Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- CLI utility and Python module for analyzing log files and other data.☆148Updated 6 months ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- USA based Information Security & I.T. Conferences☆33Updated 2 years ago
- Analyse your NGINX access logs and create beautiful maps of the locations from which people access your service.☆117Updated 5 years ago
- A pure Python script to easily get a reverse shell☆51Updated 2 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Anteater - CI/CD Gate Check Framework☆177Updated last year
- ☆36Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆46Updated this week