ynadji / hands-on-adversarial-ml
As seen at DEF CON and O'Reilly Live Trainings
☆23Updated last year
Alternatives and similar repositories for hands-on-adversarial-ml:
Users that are interested in hands-on-adversarial-ml are comparing it to the libraries listed below
- SANS Hunting on the Cheap☆35Updated 8 years ago
- ☆30Updated 6 years ago
- A project to label the VirusShare malware corpus using VirusTotal's public API.☆30Updated last year
- Copy cat model for Proofpoint☆81Updated 4 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 4 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- My notes on various topics☆64Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆78Updated 9 years ago
- For storing of the volumes☆4Updated 4 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- Central repo for talks and presentations☆43Updated 7 months ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 4 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆93Updated 6 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last month
- ☆10Updated 4 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago
- A library for adversarial classifier evasion☆40Updated 10 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆48Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- ☆50Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- ☆36Updated 2 months ago
- ATLAS tactics, techniques, and case studies data☆56Updated 4 months ago
- Automated Yara Rule generation using Biclustering☆63Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆104Updated 10 months ago