shramos / practical-ml-for-cybersecurityView external linksLinks
More than twenty practical cases with real datasets of application of Machine Learning to the field of Cybersecurity
☆184Jan 31, 2024Updated 2 years ago
Alternatives and similar repositories for practical-ml-for-cybersecurity
Users that are interested in practical-ml-for-cybersecurity are comparing it to the libraries listed below
Sorting:
- A curated list of amazingly awesome Cybersecurity datasets☆1,918Mar 2, 2024Updated last year
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- Este script en bash te otorgará opciones para personalizar un entorno de trabajo mas cómodo para trabajar con mayor rapidez☆13Oct 27, 2024Updated last year
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆35Sep 10, 2017Updated 8 years ago
- Deploy Google Hipster Shop microservices demo on Azure Kubernetes Service using Terraform and Skaffold, and monitor it with Prometheus an…☆16Aug 20, 2024Updated last year
- ☆18Jun 16, 2023Updated 2 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Jun 12, 2019Updated 6 years ago
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆20Aug 9, 2023Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Public datasets to help you address various cyber security problems.☆465Mar 28, 2022Updated 3 years ago
- ☆24Dec 9, 2020Updated 5 years ago
- Python based client for IBM XForce Exchange☆26Aug 5, 2016Updated 9 years ago
- PCAP files and data sets to Digital Investigation article☆28Nov 2, 2019Updated 6 years ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 3 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- ☆34Feb 5, 2021Updated 5 years ago
- For Implementing CIS Controls in Different Operating Systems☆13Aug 2, 2019Updated 6 years ago
- ☆38Apr 29, 2020Updated 5 years ago
- PowerShell para Administradores☆11Feb 18, 2020Updated 5 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 5 months ago
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆47Dec 17, 2025Updated last month
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 8 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- A customized translator for Regular Expressions, modeled after the ease and usability of Google Translate☆12Jan 12, 2023Updated 3 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 6 months ago
- ☆32Feb 6, 2026Updated last week
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Based on: https://arxiv.org/abs/2202.07453☆11Jan 15, 2023Updated 3 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- ☆22Aug 29, 2025Updated 5 months ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated 2 weeks ago
- LUNAR: Unifying Local Outlier Detection Methods via Graph Neural Networks☆49Jun 17, 2025Updated 7 months ago