MachLearnPort
Eat, sleep, code, repeat Interests: ML, data sciences and numerical/analytical modelling
MachLearnPort's Stars
gelstudios/gitfiti
abusing github commit history for the lulz
linuxkit/linuxkit
A toolkit for building secure, portable and lean operating systems for containers
mitre/cti
Cyber Threat Intelligence Repository expressed in STIX 2.0
mitre/caldera
Automated Adversary Emulation Platform
wKovacs64/pwned
A command-line tool for querying the 'Have I been pwned?' service.
malwaredllc/byob
An open-source post-exploitation framework for students, researchers and developers.
apsdehal/awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
offensive-security/exploitdb
The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb
SpacehuhnTech/esp8266_deauther
Affordable WiFi hacking platform for testing and learning
VieVaWaldi/ReinforcementLearning
University Project for me to understand different RL Algos and how to implement a proper environment
Trusted-AI/AIX360
Interpretability and explainability of data and machine learning models
Greenwolf/social_mapper
A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)
berzerk0/Probable-Wordlists
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
28mm/blast-radius
Interactive visualizations of Terraform dependency graphs using d3.js
robcowart/kibana_plugins_list
A list of Kibana Plugins
abhinavbom/Threat-Intelligence-Hunter
TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own local database of indicators.
hslatman/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
daviddao/awful-ai
😈Awful AI is a curated list to track current scary usages of AI - hoping to raise awareness
CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers
aka "Bayesian Methods for Hackers": An introduction to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view. All in pure Python ;)
hudson-and-thames/mlfinlab
MlFinLab helps portfolio managers and traders who want to leverage the power of machine learning by providing reproducible, interpretable, and easy to use tools.
atc-project/atomic-threat-coverage
Actionable analytics designed to combat threats
floodsung/Deep-Learning-Papers-Reading-Roadmap
Deep Learning papers reading roadmap for anyone who are eager to learn this amazing tech!
adam-p/markdown-here
Google Chrome, Firefox, and Thunderbird extension that lets you write email in Markdown and render it before sending.
rmaestre/spatial-autocorrelation
A spatial autocorrelation to study home intrusions
socprime/soc_workflow_app_ce
SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack, and view Saved Searches configured by teammates.
elastic/stack-docker
Project no longer maintained.
kahun/awesome-sysadmin
A curated list of amazingly awesome open source sysadmin resources inspired by Awesome PHP.
robcowart/elastiflow
Network flow analytics (Netflow, sFlow and IPFIX) with the Elastic Stack
kdeldycke/awesome-falsehood
😱 Falsehoods Programmers Believe in
imthenachoman/How-To-Secure-A-Linux-Server
An evolving how-to guide for securing a Linux server.