Machine Learning for Cyber Security
☆49Dec 25, 2019Updated 6 years ago
Alternatives and similar repositories for ML_CyberSecurity
Users that are interested in ML_CyberSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- An open source framework to easily build and deploy eBPF/XDP network monitoring probes and clusters in order to perform Service Programs …☆25Jun 1, 2022Updated 3 years ago
- A lightweight workshop build on the shoulders of giants.☆18Sep 13, 2019Updated 6 years ago
- A very simple app to make formatted flashcards from Google Sheets☆11Jul 25, 2018Updated 7 years ago
- Earn Achievements while learning how to code☆11Feb 11, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Security Analytics UoM - COMP90073 - S2 2020☆10Oct 1, 2021Updated 4 years ago
- NesDev is a modular cycle-accurate NES emulator development toolkit for C++.☆11Feb 9, 2021Updated 5 years ago
- A tool to display the minimap of a game larger on a second screen☆18Jan 4, 2021Updated 5 years ago
- Hiding Text and Image inside an Image☆17Jan 5, 2021Updated 5 years ago
- yf is a CLI tool that allows for quick and easy access to Yahoo! Finance market data.☆21May 15, 2021Updated 4 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Using Telegram's "People Nearby" feature to pinpoint people (technically) around the globe☆86Feb 9, 2021Updated 5 years ago
- Do you want to learn AI Security but don't know where to start ? Take a look at this map.☆31Apr 23, 2024Updated 2 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- IT Risk Management tools☆16Apr 4, 2025Updated last year
- wifiDOS with scapy☆16May 4, 2016Updated 10 years ago
- AIBOM Workshop RSA 2024☆15May 20, 2024Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- I have starred over 2,700 repos on GitHub, and it's difficult to track/organize them. This is a tool to easily visualize and search your …☆22Mar 12, 2023Updated 3 years ago
- Chip8 emulator in C++ with graphics rendered directly on the terminal.☆33Jun 23, 2025Updated 10 months ago
- Markify is an open source command line application written in python which scrapes data from your social media accounts and utilises mark…☆13Aug 8, 2024Updated last year
- A small script to make sure your status isn't updated to 'Away' in your IM by triggering automated actions when you are afk☆11Aug 19, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆12Jan 26, 2024Updated 2 years ago
- eBPF C programs injectable in a network card to extract packets' features for detecting different network attacks.☆14May 6, 2022Updated 3 years ago
- Shell to bypass cmd usage restrictions on Windows.☆30Apr 2, 2021Updated 5 years ago
- A GNOME extension for controlling and monitoring your ProtonVPN connection.☆11Mar 20, 2022Updated 4 years ago
- a raytracer written in applescript☆15Feb 1, 2021Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- A CLI Tool to easily generate your Terraform configuration☆19Feb 20, 2021Updated 5 years ago
- Utility to transfer chat history from whatsapp over to signal as good as possible☆27Jan 30, 2021Updated 5 years ago
- ☆18Jul 25, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- H-E-B Curbside availability finder☆10Feb 6, 2021Updated 5 years ago
- Machine Learning for Cyber Security☆30Dec 14, 2021Updated 4 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Manage hosts (/etc/hosts) files from the command line. Supports presets (different static host mappings enabled at different times)☆13Nov 4, 2015Updated 10 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- This Powershell script will change a users office 365 password, disable owa and active sync, forward their emails, and hide them from the…☆14Jan 4, 2016Updated 10 years ago