ynadji / hands-on-adversarial-mlLinks
As seen at DEF CON and O'Reilly Live Trainings
☆24Updated 2 months ago
Alternatives and similar repositories for hands-on-adversarial-ml
Users that are interested in hands-on-adversarial-ml are comparing it to the libraries listed below
Sorting:
- SANS Hunting on the Cheap☆35Updated 9 years ago
- ☆30Updated 7 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- ☆93Updated 6 years ago
- My notes on various topics☆65Updated last year
- Paper and Links to Crimeware in the Modern Era☆31Updated 6 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Code for shelLM tool☆55Updated 8 months ago
- Central repo for talks and presentations☆46Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- ☆12Updated 8 years ago
- Copy cat model for Proofpoint☆89Updated 5 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- A tool to extract structured cyber information from incident reports.☆81Updated 7 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 3 years ago
- ☆16Updated 7 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Data Scientists Go To Jupyter☆66Updated 7 months ago
- ☆60Updated 4 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- This repository shows the prompts we used for each agent in CVE-Genie☆23Updated 4 months ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated last year