ynadji / hands-on-adversarial-ml
As seen at DEF CON and O'Reilly Live Trainings
☆23Updated last year
Alternatives and similar repositories for hands-on-adversarial-ml:
Users that are interested in hands-on-adversarial-ml are comparing it to the libraries listed below
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- Central repo for talks and presentations☆46Updated 9 months ago
- SANS Hunting on the Cheap☆35Updated 9 years ago
- Copy cat model for Proofpoint☆83Updated 4 years ago
- ☆93Updated 6 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- ATLAS tactics, techniques, and case studies data☆64Updated this week
- A Python library to help with some common threat hunting data analysis operations☆142Updated 2 years ago
- ☆30Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆39Updated 4 months ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- Code for shelLM tool☆51Updated 3 months ago
- Automated Yara Rule generation using Biclustering☆66Updated 3 years ago
- For storing of the volumes☆4Updated 5 years ago
- The Elastic Security Research team produces public-facing content, in the way of summary blogs, detailed releases, and artifacts; articul…☆9Updated 2 years ago
- A library for adversarial classifier evasion☆41Updated 10 years ago
- ☆10Updated 4 years ago
- ☆104Updated 10 months ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- ☆148Updated 2 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆20Updated this week
- Explore AI Supply Chain Risk with the AI Risk Database☆53Updated 11 months ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- MAEC Schemas and Schema Development☆87Updated 5 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago