Data Mining for Cybersecurity
☆79Jun 21, 2022Updated 3 years ago
Alternatives and similar repositories for Data-Mining-for-Cybersecurity
Users that are interested in Data-Mining-for-Cybersecurity are comparing it to the libraries listed below
Sorting:
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- CTFd scoreboard for a single category☆12Aug 23, 2019Updated 6 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year
- ☆13Jul 25, 2022Updated 3 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆18Mar 27, 2023Updated 2 years ago
- Vulnerability Environment Build with Dockerfile -> Docker Hub☆20May 16, 2025Updated 9 months ago
- 四川大学本科、硕士、博士论文LaTeX模版☆115Apr 8, 2024Updated last year
- 《四川大学计软网学生自救手册》☆83Nov 30, 2024Updated last year
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- Эта программа ищет забытые биткоин кошельки☆11Aug 10, 2024Updated last year
- machine learning for security☆77Mar 15, 2020Updated 5 years ago
- A WeChat (and Weixin) chatbot skeleton in Python with queue/delayed messages support.☆12Jan 12, 2026Updated last month
- IATHook 测试例子☆10Jan 8, 2020Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Tool to identify domains containing Pinyin language☆12Oct 18, 2014Updated 11 years ago
- ☆11Nov 14, 2024Updated last year
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- ☆12Aug 5, 2015Updated 10 years ago
- Rust bot that works on IRC and Slack for tracking karma (upvotes/downvotes...)☆18Mar 13, 2025Updated 11 months ago
- This is a test Library.☆12Nov 3, 2017Updated 8 years ago
- Mad (╯°□°)╯'ing☆10Nov 22, 2022Updated 3 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- A simple PowerShell module for generating a markdown file with all the commands from a specified module for use as a basis for a readme o…☆10Apr 20, 2019Updated 6 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Reference list of email processing resources; focus on preservation and PII handling☆14Apr 20, 2022Updated 3 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- ☆11Dec 26, 2019Updated 6 years ago
- Nexus Repository Manager3 - 远程执行代码漏洞回显payload☆13Sep 29, 2020Updated 5 years ago
- 我的演讲 ppt or pdf 归档库☆10Mar 28, 2021Updated 4 years ago
- ☆13Apr 11, 2022Updated 3 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Awesome LLM for Cybersecurity☆11Nov 16, 2024Updated last year
- 一个PE工具,可以解析PE结构、加壳和脱壳☆10Apr 16, 2021Updated 4 years ago