nlp classificationImplementing nlp papers relevant to classification with PyTorch, gluonnlp
Stars: ✭ 224 (-18.84%)
intelligence-iconsintelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
Stars: ✭ 32 (-88.41%)
CLUE pytorchCLUE baseline pytorch CLUE的pytorch版本基线
Stars: ✭ 72 (-73.91%)
newtNatural World Tasks
Stars: ✭ 24 (-91.3%)
pyts-reproA repository to compare the performance between the algorithms implemented in pyts and the performance reported in the literature
Stars: ✭ 15 (-94.57%)
FineGrainedVisualRecognitionFine grained visual recognition tensorflow baseline on CUB, Stanford Cars, Dogs, Aircrafts, and Flower102.
Stars: ✭ 19 (-93.12%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (-86.59%)
thremulation-stationSmall-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Stars: ✭ 28 (-89.86%)
InvizzzibleInviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Stars: ✭ 268 (-2.9%)
threat-intelSignatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (-52.9%)
CreditAn example project that predicts risk of credit card default using a Logistic Regression classifier and a 30,000 sample dataset.
Stars: ✭ 18 (-93.48%)
file watchtowerLightweight File Integrity Monitoring Tool
Stars: ✭ 27 (-90.22%)
LOLBAS222APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 100 (-63.77%)
hassh-utilshassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hassh)
Stars: ✭ 41 (-85.14%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (-74.28%)
vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (-44.57%)
IRIS📚A Multi-Nomial Classification of Iris Dataset.
Stars: ✭ 15 (-94.57%)
DomainCATDomain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (-87.68%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-90.94%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (-90.22%)
irmaenpoint detection / live analysis & sandbox host / signatures quality test
Stars: ✭ 25 (-90.94%)
ioc-fangerFang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (-82.97%)
mobileAuditDjango application that performs SAST and Malware Analysis for Android APKs
Stars: ✭ 140 (-49.28%)
binary-auditing-solutionsLearn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
Stars: ✭ 61 (-77.9%)
d4-coreD4 core software (server and sample sensor client)
Stars: ✭ 40 (-85.51%)
candockA time series signal analysis and classification framework
Stars: ✭ 56 (-79.71%)
mkpolyA simple polymorphic engine
Stars: ✭ 28 (-89.86%)
CvTThis is an official implementation of CvT: Introducing Convolutions to Vision Transformers.
Stars: ✭ 262 (-5.07%)
Skin-Cancer-SegmentationClassification and Segmentation with Mask-RCNN of Skin Cancer using ISIC dataset
Stars: ✭ 61 (-77.9%)
malware api classMalware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers
Stars: ✭ 134 (-51.45%)
facerec-bias-bfwSource code and notebooks to reproduce experiments and benchmarks on Bias Faces in the Wild (BFW).
Stars: ✭ 40 (-85.51%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (-37.68%)
FatherLD_PRELOAD rootkit
Stars: ✭ 59 (-78.62%)
Predictive-Maintenance-of-Aircraft-EngineIn this project I aim to apply Various Predictive Maintenance Techniques to accurately predict the impending failure of an aircraft turbofan engine.
Stars: ✭ 48 (-82.61%)
verseagilityRamp up your custom natural language processing (NLP) task, allowing you to bring your own data, use your preferred frameworks and bring models into production.
Stars: ✭ 23 (-91.67%)
InfectpeInfectPE - Inject custom code into PE file [This project is not maintained anymore]
Stars: ✭ 266 (-3.62%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-83.7%)
Bold-Falcon毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;方班网络安全综合实验-设计类;
Stars: ✭ 30 (-89.13%)
VX-APICollection of various malicious functionality to aid in malware development
Stars: ✭ 904 (+227.54%)
clanaCLANA is a toolkit for classifier analysis.
Stars: ✭ 28 (-89.86%)
rhinoAgile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (-82.25%)
pyetiPython bindings for Yeti's API
Stars: ✭ 15 (-94.57%)
Mead BaselineDeep-Learning Model Exploration and Development for NLP
Stars: ✭ 238 (-13.77%)
AutoIt-RipperExtract AutoIt scripts embedded in PE binaries
Stars: ✭ 101 (-63.41%)
r2yarar2yara - Module for Yara using radare2 information
Stars: ✭ 30 (-89.13%)
carrierwave-attachmentscannerAdds the ability to send CarrierWave uploads to Attachment Scanner for virus and malware prevention.
Stars: ✭ 14 (-94.93%)
DeepSentiPersRepository for the experiments described in the paper named "DeepSentiPers: Novel Deep Learning Models Trained Over Proposed Augmented Persian Sentiment Corpus"
Stars: ✭ 17 (-93.84%)
Fe2O3Simple prepender virus written in Rust
Stars: ✭ 84 (-69.57%)
connectorsOpenCTI connectors
Stars: ✭ 135 (-51.09%)
SGDLibraryMATLAB/Octave library for stochastic optimization algorithms: Version 1.0.20
Stars: ✭ 165 (-40.22%)