More than twenty practical cases with real datasets of application of Machine Learning to the field of Cybersecurity
☆190Jan 31, 2024Updated 2 years ago
Alternatives and similar repositories for practical-ml-for-cybersecurity
Users that are interested in practical-ml-for-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of amazingly awesome Cybersecurity datasets☆1,967Mar 2, 2024Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 4 years ago
- ☆16Apr 14, 2023Updated 3 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆20Jul 31, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks☆174Oct 1, 2020Updated 5 years ago
- Este script en bash te otorgará opciones para personalizar un entorno de trabajo mas cómodo para trabajar con mayor rapidez☆13Oct 27, 2024Updated last year
- Deploy Google Hipster Shop microservices demo on Azure Kubernetes Service using Terraform and Skaffold, and monitor it with Prometheus an…☆13Aug 20, 2024Updated last year
- Some set of scripts to unpack odin packets into separate files !!! Migrated to Codeberg !!!☆13Oct 9, 2023Updated 2 years ago
- The official implementation of paper "Drop-Activation: Implicit Parameter Reduction and Harmonious Regularization".☆10May 30, 2019Updated 6 years ago
- Public datasets to help you address various cyber security problems.☆478Mar 28, 2022Updated 4 years ago
- Based on: https://arxiv.org/abs/2202.07453☆11Jan 15, 2023Updated 3 years ago
- ☆18Jan 23, 2023Updated 3 years ago
- ☆13Nov 30, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆106May 28, 2021Updated 4 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- Subgraphormer: Unifying Subgraph GNNs and Graph Transformers via Graph Products (ICML 2024)☆11Jul 13, 2024Updated last year
- heterogeneous graph attention network for SMEs bankruptcy prediction☆13Feb 26, 2021Updated 5 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 4 years ago
- ☆38Apr 29, 2020Updated 6 years ago
- swiftUI for beginning☆10Apr 2, 2020Updated 6 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Official Repository of the Entity-based Reinforcement Learning for Autonomous Cyber Defence paper.☆18Jan 24, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Dec 14, 2022Updated 3 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Graph clustering and Node embeddings with word2vec☆14Mar 2, 2019Updated 7 years ago
- Threat Hunting with Elastic Stack, Published by Packt☆41Apr 22, 2026Updated 2 weeks ago
- ☆24Dec 9, 2020Updated 5 years ago
- Repository contains tasks and exercises that were made during Udemy Pandas course. I decided to do this course to broaden my knowledge o…☆11Oct 25, 2017Updated 8 years ago
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆13Apr 11, 2022Updated 4 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆42Feb 5, 2020Updated 6 years ago
- Demo code showing how to use Java's StructuredTaskScope☆11Dec 10, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11Oct 18, 2023Updated 2 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- LOL's collections☆24Oct 4, 2020Updated 5 years ago
- This project is an object detection and object counting tool built in Python. It uses computer vision techniques and deep learning models…☆10Apr 27, 2024Updated 2 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- App with Server Side Template Injection (SSTI) vulnerability - possible RCE - in Flask. Free vulnerable app for ethical hacking / penetra…☆17Sep 15, 2022Updated 3 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago