security machine learning
☆72May 15, 2017Updated 8 years ago
Alternatives and similar repositories for sec-ml
Users that are interested in sec-ml are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- public database for research☆18Apr 22, 2017Updated 9 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- awesome security paper☆157Oct 3, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,528Oct 1, 2020Updated 5 years ago
- yarning about data science for white hat security researchers☆118Oct 16, 2019Updated 6 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Dec 16, 2020Updated 5 years ago
- ☆106Feb 2, 2018Updated 8 years ago
- Multi-Thread Vulnerability Verify Framework☆55Oct 25, 2018Updated 7 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- 一个半自动化命令注入漏洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆92Sep 28, 2017Updated 8 years ago
- Deep learnning for detection with xss☆148Apr 24, 2025Updated last year
- ☆11Jun 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆10Dec 28, 2015Updated 10 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- cve-2014-0130 rails directory traversal vuln☆18May 15, 2017Updated 8 years ago
- a passive scanner based on Mitmproxy and Arachni☆106Aug 17, 2017Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Data Hacking Project☆784Mar 5, 2019Updated 7 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- ☆150Jun 19, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Dynamic file detection tool based on crawler 基于爬虫的动态敏感文件探测工具☆253May 2, 2020Updated 5 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Sep 12, 2017Updated 8 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- 个人博客☆12Nov 20, 2016Updated 9 years ago
- ☆14Jan 14, 2026Updated 3 months ago
- ☆20Sep 25, 2017Updated 8 years ago
- 用于扫描git,svn泄露☆78Jul 29, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14May 13, 2018Updated 7 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- Scripts to simplify rooting of Sony PRS-T2 E-reader from Linux☆10Sep 23, 2020Updated 5 years ago
- Various tools for managing bug bounty recon and exploration.☆48Dec 8, 2022Updated 3 years ago
- Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop…☆16Jan 11, 2017Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 9 years ago
- fuzz☆125Jul 18, 2015Updated 10 years ago