ynadji / hands-on-adversarial-mlLinks
As seen at DEF CON and O'Reilly Live Trainings
☆24Updated 4 months ago
Alternatives and similar repositories for hands-on-adversarial-ml
Users that are interested in hands-on-adversarial-ml are comparing it to the libraries listed below
Sorting:
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- SANS Hunting on the Cheap☆36Updated 9 years ago
- ☆12Updated 8 years ago
- ☆93Updated 7 years ago
- ☆16Updated 7 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- ☆30Updated 7 years ago
- Use Markov Chains to obfuscate data as other data☆55Updated 9 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆133Updated 10 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 7 years ago
- Central repo for talks and presentations☆47Updated last year
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- ML research on software vulnerabilities☆19Updated 6 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- My notes on various topics☆67Updated 2 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- Copy cat model for Proofpoint☆91Updated 5 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 3 years ago
- ☆80Updated 6 years ago
- A Python library to help with some common threat hunting data analysis operations☆143Updated 2 years ago
- Fuzzy Hash calculated from import API of PE files☆91Updated 3 years ago
- eXpose deep neural network, detects malicious URLs, file paths and registry keys with proper training☆47Updated 7 years ago
- Dockerized REST service to look up URLs in Google Safe Browsing v4 API☆76Updated 3 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 10 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago