Pinned Repositories
ATMoS
Security management in SDN using Reinforcement Learning
2.6.1
General Configuration
ez-killnet
kill or mitm whole net using arp poison
js_attacks
SDN-RL-Threat-Investigations
Automatic Threat Hunting Investigation via SDN + RL
SecureBeat
Heart Rhythm based Authentication - McMaster University
PrivPkt
Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference Attack, Encrypted Traffic Classification)
Extensive_Evaluations
Experiments evaluating 10+ ml models in anomaly detection cases for continuous and implicit authentication using the HMOG data set.
ezzeldinadel's Repositories
ezzeldinadel/SDN-RL-Threat-Investigations
Automatic Threat Hunting Investigation via SDN + RL
ezzeldinadel/attack_flow_detector
ezzeldinadel/attack_technique_detector
ezzeldinadel/awesome-cybersecurity-blueteam
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
ezzeldinadel/awesome-forensics
A curated list of awesome forensic analysis tools and resources
ezzeldinadel/awesome-hacking
A curated list of awesome Hacking tutorials, tools and resources
ezzeldinadel/awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
ezzeldinadel/awesome-production-machine-learning
A curated list of awesome open source libraries to deploy, monitor, version and scale your machine learning
ezzeldinadel/awesome-security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
ezzeldinadel/AWS
ezzeldinadel/bearded-avenger
CIF v3 -- the fastest way to consume threat intelligence
ezzeldinadel/ciml
A Course in Machine Learning
ezzeldinadel/colorls
A Ruby gem that beautifies the terminal's ls command, with color and font-awesome icons. :tada:
ezzeldinadel/covidwatch-cloud-functions
Cloud Functions and Firestore Rules
ezzeldinadel/data_acq_esdx
ezzeldinadel/DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
ezzeldinadel/DiCE
Generate Diverse Counterfactual Explanations for any machine learning model.
ezzeldinadel/django-ash
ezzeldinadel/documents
Decentralized Privacy-Preserving Proximity Tracing -- Documents
ezzeldinadel/ezzeldinadel
ezzeldinadel/lime
Lime: Explaining the predictions of any machine learning classifier
ezzeldinadel/Loki
Loki - Simple IOC and Incident Response Scanner
ezzeldinadel/mordor
Re-play Adversarial Techniques
ezzeldinadel/NextAI-MachineLearning
Materials for the NextAI Technical Stream Course on Machine Learning
ezzeldinadel/PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
ezzeldinadel/projects
old projects
ezzeldinadel/sof-elk
Configuration files for the SOF-ELK VM, used in SANS FOR572
ezzeldinadel/spmf
ezzeldinadel/ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
ezzeldinadel/ThreatHunting
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts