|
Python |
5 |
NEDAGEN - A Network traffic Dataset Generator for Network-based Intrusion Detection Systems |
Jan 09, 2024 |
|
Jupyter Notebook |
2 |
Intrusion Detection of Imbalanced Network Traffic using Machine Learning and Deep Learning |
Dec 14, 2023 |
|
HTML |
2 |
Project based on SVM and Random Forest to detect Intrusion on network traffic |
Jan 22, 2024 |
|
Python |
27 |
Ida pro plugin. The antiVM aims to quickly identify anti-virtual machine and anti-sandbox behavior. This … |
Apr 27, 2023 |
|
Go |
87 |
Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on … |
Jul 19, 2022 |
|
Python |
4 |
Feature computed from IP behavior and network traffic to analyze and classify attack/attackers |
Nov 15, 2019 |
|
Zeek |
7 |
A Zeek package to detect the Pingback malware ICMP tunnel command and control (C2) network … |
Aug 05, 2021 |
|
Python |
20 |
[WWW-21] DF-TAR: A Deep Fusion Network for Citywide Traffic Accident Risk Prediction with Dangerous Driving … |
Feb 19, 2023 |
|
Shell |
2 |
An Intrusion Detection System to detect malicious network traffic on a particular host and provide … |
May 03, 2023 |
|
Swift |
13 |
A macOS behavior audit / event monitoring system with scope of file, process and network … |
May 17, 2023 |
|
HCL |
8 |
Provides a DigitalOcean Cloud Firewall resource. DigitalOcean Cloud Firewalls are a network-based, stateful firewall service … |
Sep 21, 2023 |
|
None |
2 |
Network intrusion detection systems (NIDS) are set up at a planned point within the network … |
Jan 11, 2023 |
|
Jupyter Notebook |
6 |
A short course on how to use Machine Learning for analyzing and detecting real malware … |
Jun 30, 2022 |
|
Python |
2 |
Valkyrie Framework is an open source suite of tools that enable hunt teams to locate … |
Jul 31, 2023 |
|
Jupyter Notebook |
7 |
Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. … |
Mar 25, 2023 |
|
Python |
312 |
Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to … |
Aug 20, 2022 |
|
Shell |
3 |
"IntrusionDetector" is a bash script that monitors system logs, network traffic and processes for signs … |
Apr 04, 2023 |
|
Java |
392 |
CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly … |
May 07, 2023 |
|
TeX |
97 |
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of … |
Jan 02, 2023 |
|
None |
41 |
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning … |
May 04, 2023 |
|
None |
2 |
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning … |
Jun 14, 2023 |
|
HTML |
2 |
A cybersecurity solution that leverages the power of artificial intelligence and machine learning to accurately … |
Nov 13, 2023 |
|
None |
23 |
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly … |
Aug 05, 2022 |
|
C |
8 |
Non-intrusive DDS Recorder is a tool to record all the DDS traffic in your network, … |
May 09, 2022 |
|
Python |
12 |
This repository demonstrates an approach to set up a central API Gateway with integrations to … |
May 12, 2022 |
|
None |
2 |
ReconCobra Reconcobra is Foot printing software for Ultimate Information Gathering Kali, Parrot OS, Black Arch, … |
May 30, 2021 |
|
Perl |
64 |
ReconCobra Reconcobra is Foot printing software for Ultimate Information Gathering Kali, Parrot OS, Black Arch, … |
Aug 11, 2022 |
|
None |
3 |
2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the … |
Feb 24, 2023 |
|
Jupyter Notebook |
6 |
With WWW being the global platform, various fields inclusive to the same have emerged until … |
Nov 25, 2021 |
|
None |
14 |
### **Awesome Penetration Testing** [![Links Check](https://4.bp.blogspot.com/-_NIGc5XKpSw/WHt9d7wCXaI/AAAAAAAAB0o/OYIv8EWjIoYh44jfxIRSrRYbgrn3MZKEQCLcB/s1600/penetration%2Btesting.png)](http://kalitut.com) [![10 Common Hacking Techniques](http://img.youtube.com/vi/V3CTfJ2ZP7M/0.jpg)](http://www.youtube.com/watch?v=V3CTfJ2ZP7M "10 Common Hacking Techniques") A … |
Sep 04, 2022 |
|
None |
3 |
NetSaver Pro ======== Please scroll down if you want to ask a question, request a … |
Nov 30, 2021 |
|
Rich Text Format |
2 |
NetSaver Pro ======== Please scroll down if you want to ask a question, request a … |
Nov 30, 2021 |
|
None |
5 |
Usage: python sqlmap.py [options] Options: -h, --help Show basic help message and exit -hh Show … |
Sep 24, 2022 |
|
None |
10 |
![logo](https://github.com/curated-intel/Ukraine-Cyber-Operations/blob/main/ci-logo.png) # Ukraine-Cyber-Operations Curated Intelligence is working with analysts from around the world to provide … |
Mar 20, 2024 |
|
None |
4 |
NICEHASH PLATFORM TERMS OF USE AND NICEHASH MINING TERMS OF SERVICE PLEASE READ THESE NICEHASH … |
Jul 03, 2023 |
|
HTML |
2 |
# Routing with EdgeJS https://github.com/Nate158s The `{{ PACKAGE_NAME }}/core` package provides a JavaScript API for … |
May 24, 2022 |
|
None |
16 |
Skip to content Search… All gists Back to GitHub Sign in Sign up Instantly share … |
Sep 29, 2022 |
|
None |
16 |
W3C Strategic Highlights September 2019 This report was prepared for the September 2019 W3C Advisory … |
Aug 21, 2022 |
|
None |
8 |
Poole, Mackworth & Goebel 1998, p. 1. Russell & Norvig 2003, p. 55. Definition of … |
Sep 07, 2022 |
|
None |
10 |
{ "releases": { "2.0.4": [ "[Fixed] Refresh for Enterprise repositories did not handle API error … |
Aug 03, 2022 |