ynadji / hands-on-adversarial-mlLinks
As seen at DEF CON and O'Reilly Live Trainings
☆23Updated last year
Alternatives and similar repositories for hands-on-adversarial-ml
Users that are interested in hands-on-adversarial-ml are comparing it to the libraries listed below
Sorting:
- SANS Hunting on the Cheap☆35Updated 9 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- ☆93Updated 6 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆153Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 9 years ago
- ☆30Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- ☆12Updated 8 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- ☆16Updated 2 years ago
- Automated Yara Rule generation using Biclustering☆68Updated 4 years ago
- My notes on various topics☆64Updated last year
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- SightingDB is a database for Sightings☆22Updated 2 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated 2 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Dockerized REST service to look up URLs in Google Safe Browsing v4 API☆77Updated 3 years ago
- ☆51Updated 6 years ago
- Copy cat model for Proofpoint☆85Updated 5 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago