ynadji / hands-on-adversarial-mlView external linksLinks
As seen at DEF CON and O'Reilly Live Trainings
☆24Jul 30, 2025Updated 6 months ago
Alternatives and similar repositories for hands-on-adversarial-ml
Users that are interested in hands-on-adversarial-ml are comparing it to the libraries listed below
Sorting:
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- Copy cat model for Proofpoint☆91Apr 30, 2020Updated 5 years ago
- ☆16Mar 5, 2018Updated 7 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- ☆16Mar 16, 2021Updated 4 years ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Feb 15, 2022Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Jul 6, 2023Updated 2 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- A function invocation framework for Python☆11Feb 21, 2024Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆242Nov 27, 2025Updated 2 months ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- A Gephi plugin for community detection in dynamic networks☆12Jan 14, 2014Updated 12 years ago
- GitHub Action to add reviewer(s) to a pull request.☆12Apr 23, 2024Updated last year
- ☆12Oct 1, 2024Updated last year
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- A few Clio examples☆14Oct 11, 2021Updated 4 years ago
- An 802.11 probe request and beacon sniffer.☆14Mar 16, 2021Updated 4 years ago
- ☆13Oct 30, 2022Updated 3 years ago
- Auto Encoder on Tensorflow☆12Oct 18, 2017Updated 8 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- Dockerized TOR socks5☆10Jul 15, 2018Updated 7 years ago
- ☆11Dec 17, 2024Updated last year
- Learn about cryptography concepts - Both basics and core.☆10Aug 9, 2024Updated last year
- ☆11Mar 9, 2018Updated 7 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago