ynadji / hands-on-adversarial-ml
As seen at DEF CON and O'Reilly Live Trainings
☆23Updated last year
Alternatives and similar repositories for hands-on-adversarial-ml:
Users that are interested in hands-on-adversarial-ml are comparing it to the libraries listed below
- ☆30Updated 6 years ago
- SANS Hunting on the Cheap☆35Updated 8 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated last year
- Copy cat model for Proofpoint☆81Updated 4 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆109Updated 2 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆48Updated last year
- Central repo for talks and presentations☆43Updated 5 months ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- Data Scientists Go To Jupyter☆62Updated last month
- My notes on various topics☆64Updated last year
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆12Updated 7 years ago
- Malware Bypass Research using Reinforcement Learning☆102Updated 8 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 4 years ago
- ☆10Updated 4 years ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 9 months ago
- For storing of the volumes☆4Updated 4 years ago
- Explore AI Supply Chain Risk with the AI Risk Database☆51Updated 8 months ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Use Markov Chains to obfuscate data as other data☆51Updated 8 years ago
- ☆93Updated 6 years ago
- Malware Classifier From Network Captures☆82Updated 7 years ago
- Sweet, sweet, secrepo.com html.☆131Updated 3 years ago
- ATLAS tactics, techniques, and case studies data☆54Updated 3 months ago