Data Mining for Cybersecurity
☆78Jun 21, 2022Updated 3 years ago
Alternatives and similar repositories for Data-Mining-for-Cybersecurity
Users that are interested in Data-Mining-for-Cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 用于应用密码学课程课程实践,编写一个发送端程序和一个接收端程序,接收端要完成对消息的验证和解密。 用DES的ECB模式完成对信件内容的加密。 用RSA对上面的对称密钥进行加密,实现会话密钥交换。☆17Jun 2, 2019Updated 6 years ago
- CTFd scoreboard for a single category☆12Aug 23, 2019Updated 6 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- 四川大学本科、硕士、博士论文LaTeX模版☆122Apr 8, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A static analysis tool for Java programs, based on the theory of code property graphs.☆19Mar 27, 2023Updated 3 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆184Jan 30, 2023Updated 3 years ago
- datasets from my cyber security research papers☆10Jan 12, 2021Updated 5 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- ☆13Jul 25, 2022Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- IATHook 测试例子☆10Jan 8, 2020Updated 6 years ago
- 灵蛇·代理抓取工具☆16Aug 31, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- scu-ctf平台上题目的Writeup☆14Oct 30, 2023Updated 2 years ago
- A large labeled corpus for Application Privacy Policy in Chinese to train named entity recognition models for Android Dangerous PERMSSION…☆11Jun 19, 2025Updated 9 months ago
- 四川大学本科生毕业论文(设计)LaTeX 模板☆84Apr 26, 2020Updated 5 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆54Jun 18, 2025Updated 9 months ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Updated this week
- A simple tool to do linux emergency check☆11Mar 16, 2020Updated 6 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- A cms system for Sichuan University CTF Association☆10Mar 4, 2020Updated 6 years ago
- 华顺信安技术羊皮卷☆172Jan 20, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- 极验验证码☆11Sep 20, 2018Updated 7 years ago
- 学习使我快乐!☆14Updated this week
- AI Model Security Reading Notes☆41Mar 14, 2025Updated last year
- machine learning for security☆77Mar 15, 2020Updated 6 years ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 10 years ago
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 6 years ago
- Python tools for targeted pcap analysis.☆13Sep 9, 2015Updated 10 years ago
- 卷积神经网络提取特征并用于SVM//www.cnblogs.com/chuxiuhong/p/6132814.html☆16May 10, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Convolutional Neural Network for Text Classification in Tensorflow☆10Apr 3, 2017Updated 9 years ago
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- Vulnerability Environment Build with Dockerfile -> Docker Hub☆20May 16, 2025Updated 10 months ago
- 基于UICrawler开源工程,开发的针对android APP 自动化遍历工具,针对hybird或者纯native APP,做深度优先遍历。主要用于监听被抓取APP的页面是否有变动,并生成diff报告☆14Mar 1, 2019Updated 7 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆52Aug 10, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago