bowl-of-porrige's Stars
SonarSource/argument-injection-vectors
A curated list of argument injection vectors
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
OISF/suricata-update
The tool for updating your Suricata rules.
HynekPetrak/javascript-malware-collection
Collection of almost 40.000 javascript malware samples
WestHealth/pyvis
Python package for creating and visualizing interactive network graphs.
ruleminer/FI-rules4XAI
Repository for paper "Fusion of rule induction and XAI-based feature importance for explaining decisions of black box models for tabular data"
ICL-ml4csec/EarlyCrowAPT
dselivanov/text2vec
Fast vectorization, topic modeling, distances and GloVe word embeddings in R.
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
uber-common/metta
An information security preparedness tool to do adversarial simulation.
tfjmp/provenance-papers
ICL-ml4csec/Mateen
Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection
asrocha/exploitdb-API
neo4j-labs/neosemantics
Graph+Semantics: Import/Export RDF from Neo4j. SHACL Validation, Model mapping and more.... If you like it, please ★ ⇧
MilesCranmer/PySR
High-Performance Symbolic Regression in Python and Julia
MilesCranmer/symbolic_deep_learning
Code for "Discovering Symbolic Models from Deep Learning with Inductive Biases"
doriguzzi/lucid-ddos
A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
ahlashkari/CICFlowMeter
CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has been used in many Cybersecurity datsets such as Android Adware-General Malware dataset (CICAAGM2017), IPS/IDS dataset (CICIDS2017), Android Malware dataset (CICAndMal2017) and Distributed Denial of Service (CICDDoS2019).
microsoft/dpsgd-calculator
microsoft/TaskTracker
TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a simple linear probe-based method and a more sophisticated metric learning method to achieve this. The project also releases the computationally expensive activation data to stimulate further AI safety research.
TrusteeML/emperor
AI/ML and Cybersecurity: The Emperor has no Clothes
hotpxl/low-rate-tcp-targeted-dos-attacks
Reproduction of Low-Rate TCP-Targeted Denial of Service Attacks
mitre/caldera
Automated Adversary Emulation Platform
hihey54/pragmaticAssessment
Repository for the EuroS&P'23 paper "SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection"
Azure-Samples/graphrag-accelerator
One-click deploy of a Knowledge Graph powered RAG (GraphRAG) in Azure
risksense/mulval
A logic-based enterprise network security analyzer
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
cyber-research/APTMalware
APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples
OpenBMB/ChatDev
Create Customized Software using Natural Language Idea (through LLM-powered Multi-Agent Collaboration)
ShiArthur03/ShiArthur03