roshanlam / ML_CyberSecurityLinks
Machine Learning for Cyber Security
☆48Updated 6 years ago
Alternatives and similar repositories for ML_CyberSecurity
Users that are interested in ML_CyberSecurity are comparing it to the libraries listed below
Sorting:
- Repository demonstrating the Capital One breach on your AWS account☆244Updated 5 years ago
- Script to generate a combined PDF for the Security Engineering 3rd edition book from the publicly available chapters under review.☆36Updated last year
- A simple CLI to create your resume and personal website based on your LinkedIn profile or a JSON file☆111Updated 4 years ago
- A tool to extract useful data from documents☆154Updated last year
- A curated collection of tools and resources for building security with a developer first approach.☆30Updated 3 years ago
- A repository for cybersecurity students☆41Updated last year
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Only the best quality InfoSec-resources shared, based on regular sourcing of publicly available content found on the internet.☆149Updated 5 years ago
- Awesome list of resources related to container security☆247Updated last year
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆63Updated 4 years ago
- A tool to spider Github or search URLs for various information leaks☆34Updated 2 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- The only open-source tool to analyze vulnerabilities and configuration issues with running docker container(s) and docker networks.☆125Updated 3 years ago
- USA based Information Security & I.T. Conferences☆32Updated 3 years ago
- Ongoing Infosec Deals☆114Updated 2 months ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- Swachalit - The null automation platform that hosts null.co.in.☆21Updated last year
- ☆21Updated 4 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Updated 6 years ago
- Learning Shodan through katas☆469Updated 5 years ago
- An ongoing list of virtual cybersecurity conferences.☆121Updated 4 years ago
- One Stop Anomaly Shop: Anomaly detection using two-phase approach: (a) pre-labeling using statistics, Natural Language Processing and sta…☆156Updated last month
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- A pure Python script to easily get a reverse shell☆50Updated 3 years ago
- A curated list of security tools for Hackers & Builders!☆99Updated last year
- a curated list of useful threat modeling resources☆144Updated last year
- Resources to learn about Linux, containers, k8s, and related security stuff☆40Updated 4 years ago
- Who and what to follow in the world of cyber security☆151Updated 5 years ago
- A medium interaction printer honeypot 🍯☆203Updated 2 years ago
- Static security checker for Dockerfiles☆102Updated last week