Pinned Repositories
AttackDetection
Attack Detection
Automation
Automating security tools
deeplearning-models
A collection of various deep learning architectures, models, and tips
GPT_Vuln-analyzer
Uses ChatGPT API, Python-Nmap, DNS Recon modules and uses the GPT3 model to create vulnerability reports based on Nmap scan data, and DNS scan information. It can also perform subdomain enumeration to a great extent
HELK
The Hunting ELK
Kitsune-py
A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)
Maldataset-2021
Maldataset2021 is a malware dataset that consists of 28 classes of malware, in which each class represents a malware family, and each sample gives a RGB 224x224 PNG file. The PNG files are transformed from the original binary malware files. The motivation of image transformation is to identify malware on the raw bytes of entire executable files (i.e., image), so that deep learning technologies such as CNN can be applied to malware classification, since CNN model has been demonstrated with its outstanding capability on image classification. In this view, we provide here a new dataset that contains the latest malware samples. The entire PNG files are split as, 70% for training and the remaining 30% for testing.
mlsec
Short PhD seminar on Machine Learning Security (Adversarial Machine Learning)
net_intrusion_detection
Network intrusion detection with Machine Learning (Deep Learning) experiment
PROJECT2
web-applicaion
phoenixml's Repositories
phoenixml/Kitsune-py
A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)
phoenixml/deeplearning-models
A collection of various deep learning architectures, models, and tips
phoenixml/mlsec
Short PhD seminar on Machine Learning Security (Adversarial Machine Learning)
phoenixml/net_intrusion_detection
Network intrusion detection with Machine Learning (Deep Learning) experiment
phoenixml/RedTeam-Tactics-and-Techniques
Red Teaming Tactics and Techniques
phoenixml/AggressorScripts
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
phoenixml/Artificial-Intelligence-Projects
Collection of Artificial Intelligence projects.
phoenixml/C2concealer
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
phoenixml/CobaltStrike
CobaltStrike's source code
phoenixml/cobaltstrike-1
Code and yara rules to detect and analyze Cobalt Strike
phoenixml/CobaltStrikeForensic
Toolset for research malware and Cobalt Strike beacons
phoenixml/CodeExamples
We have put together some examples of different well known machine learning algorithms. This is to make it easier to understand how it looks like when working with machine learning in code. Happy hacking!
phoenixml/crypto_utils
Set of my small utils related to cryptography, encoding, decoding etc
phoenixml/DC
Identifies the bytes that Microsoft Defender flags on.
phoenixml/deep-pwning
Metasploit for machine learning.
phoenixml/docker-1
Docker scripts and howtos
phoenixml/fleet
A flexible control server for osquery fleets
phoenixml/Kansa
A Powershell incident response framework
phoenixml/malwoverview
Malwoverview.py is a first response tool to perform an initial and quick triage in a directory containing malware samples, specific malware sample, suspect URL and domains. Additionally, it allows to download and send samples to main online sandboxes.
phoenixml/MITRE-ATT-CK-techniques
phoenixml/ML-From-Scratch
Machine Learning From Scratch. Bare bones NumPy implementations of machine learning models and algorithms with a focus on accessibility. Aims to cover everything from linear regression to deep learning.
phoenixml/MNG_AC
Code for the paper "Learning to Generate Noise for Multi-Attack Robustness" (ICML 2021)
phoenixml/models
Models and examples built with TensorFlow
phoenixml/ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
phoenixml/osquery-configuration
A repository for using osquery for incident detection and response
phoenixml/pybeacon
A collection of scripts for dealing with Cobalt Strike beacons in Python
phoenixml/Redcloud
Comfy & powerful Red Team Infrastructure deployement using Docker
phoenixml/StayKit
Cobalt Strike kit for Persistence
phoenixml/TheHive
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
phoenixml/vulnserver
Vulnerable server used for learning software exploitation